CVE-2025-36519: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-2533GST2
Unrestricted upload of file with dangerous type issue exists in WRC-2533GST2, WRC-1167GST2, WRC-2533GST2, WRC-2533GS2V-B,WRC-2533GS2-B v1.69 and earlier, WRC-2533GS2-W, WRC-1167GST2, WRC-1167GS2-B, and WRC-1167GS2H-B. If a specially crafted file is uploaded by a remote authenticated attacker, arbitrary code may be executed on the product.
AI Analysis
Technical Summary
CVE-2025-36519 is a vulnerability identified in several ELECOM CO.,LTD. wireless router models, including WRC-2533GST2, WRC-1167GST2, and related variants, specifically in firmware versions 1.69 and earlier. The issue stems from insufficient validation on file uploads, allowing authenticated remote attackers to upload files with dangerous types unrestrictedly. This flaw can be exploited to execute arbitrary code on the device, compromising its integrity. The attack vector requires network access and valid credentials, but no additional user interaction is necessary. The vulnerability does not impact confidentiality or availability directly but poses a risk to device integrity and control. No public exploits have been reported yet, but the presence of arbitrary code execution potential makes it a significant concern. The CVSS 3.0 base score of 4.3 reflects the medium severity, factoring in network attack vector, low attack complexity, and required privileges. The vulnerability affects a range of ELECOM routers widely used in small to medium enterprise and possibly home environments. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk. Attackers exploiting this vulnerability could gain persistent control over affected devices, potentially using them as footholds for further network compromise or lateral movement.
Potential Impact
For European organizations, the primary impact of CVE-2025-36519 lies in the potential compromise of network infrastructure devices, specifically ELECOM wireless routers. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized configuration changes, installation of malicious firmware, or use of the device as a pivot point for further attacks within the network. This undermines the integrity of network operations and could facilitate espionage, data exfiltration, or disruption of services indirectly. Organizations relying on these routers for critical connectivity or security segmentation may face increased risk of persistent intrusions. The requirement for authentication limits exposure but does not eliminate risk, especially if credential management is weak or default credentials are in use. Given the medium severity, the threat is moderate but could escalate if combined with other vulnerabilities or poor security practices. European entities in sectors such as telecommunications, manufacturing, or SMEs using ELECOM equipment should be particularly vigilant.
Mitigation Recommendations
1. Apply firmware updates from ELECOM as soon as they are released to address this vulnerability. 2. Restrict administrative access to the routers by limiting management interfaces to trusted IP addresses or VPNs. 3. Enforce strong authentication mechanisms, including changing default credentials and implementing multi-factor authentication if supported. 4. Monitor router logs and network traffic for unusual file upload activities or unauthorized access attempts. 5. Segment network infrastructure to isolate critical devices and reduce the attack surface. 6. Disable or restrict file upload functionality if not required for normal operations. 7. Conduct regular security audits and vulnerability assessments on network devices. 8. Educate network administrators about the risks of this vulnerability and best practices for secure device management. 9. Consider deploying network intrusion detection systems capable of identifying anomalous behavior related to device compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Czech Republic
CVE-2025-36519: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-2533GST2
Description
Unrestricted upload of file with dangerous type issue exists in WRC-2533GST2, WRC-1167GST2, WRC-2533GST2, WRC-2533GS2V-B,WRC-2533GS2-B v1.69 and earlier, WRC-2533GS2-W, WRC-1167GST2, WRC-1167GS2-B, and WRC-1167GS2H-B. If a specially crafted file is uploaded by a remote authenticated attacker, arbitrary code may be executed on the product.
AI-Powered Analysis
Technical Analysis
CVE-2025-36519 is a vulnerability identified in several ELECOM CO.,LTD. wireless router models, including WRC-2533GST2, WRC-1167GST2, and related variants, specifically in firmware versions 1.69 and earlier. The issue stems from insufficient validation on file uploads, allowing authenticated remote attackers to upload files with dangerous types unrestrictedly. This flaw can be exploited to execute arbitrary code on the device, compromising its integrity. The attack vector requires network access and valid credentials, but no additional user interaction is necessary. The vulnerability does not impact confidentiality or availability directly but poses a risk to device integrity and control. No public exploits have been reported yet, but the presence of arbitrary code execution potential makes it a significant concern. The CVSS 3.0 base score of 4.3 reflects the medium severity, factoring in network attack vector, low attack complexity, and required privileges. The vulnerability affects a range of ELECOM routers widely used in small to medium enterprise and possibly home environments. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk. Attackers exploiting this vulnerability could gain persistent control over affected devices, potentially using them as footholds for further network compromise or lateral movement.
Potential Impact
For European organizations, the primary impact of CVE-2025-36519 lies in the potential compromise of network infrastructure devices, specifically ELECOM wireless routers. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized configuration changes, installation of malicious firmware, or use of the device as a pivot point for further attacks within the network. This undermines the integrity of network operations and could facilitate espionage, data exfiltration, or disruption of services indirectly. Organizations relying on these routers for critical connectivity or security segmentation may face increased risk of persistent intrusions. The requirement for authentication limits exposure but does not eliminate risk, especially if credential management is weak or default credentials are in use. Given the medium severity, the threat is moderate but could escalate if combined with other vulnerabilities or poor security practices. European entities in sectors such as telecommunications, manufacturing, or SMEs using ELECOM equipment should be particularly vigilant.
Mitigation Recommendations
1. Apply firmware updates from ELECOM as soon as they are released to address this vulnerability. 2. Restrict administrative access to the routers by limiting management interfaces to trusted IP addresses or VPNs. 3. Enforce strong authentication mechanisms, including changing default credentials and implementing multi-factor authentication if supported. 4. Monitor router logs and network traffic for unusual file upload activities or unauthorized access attempts. 5. Segment network infrastructure to isolate critical devices and reduce the attack surface. 6. Disable or restrict file upload functionality if not required for normal operations. 7. Conduct regular security audits and vulnerability assessments on network devices. 8. Educate network administrators about the risks of this vulnerability and best practices for secure device management. 9. Consider deploying network intrusion detection systems capable of identifying anomalous behavior related to device compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-06-17T00:53:00.646Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 685a2f8edec26fc862d90947
Added to database: 6/24/2025, 4:54:38 AM
Last enriched: 2/4/2026, 8:36:23 AM
Last updated: 2/7/2026, 11:42:02 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.