Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-36519: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-2533GST2

0
Medium
VulnerabilityCVE-2025-36519cvecve-2025-36519
Published: Tue Jun 24 2025 (06/24/2025, 04:36:57 UTC)
Source: CVE Database V5
Vendor/Project: ELECOM CO.,LTD.
Product: WRC-2533GST2

Description

CVE-2025-36519 is a medium-severity vulnerability affecting multiple ELECOM CO. ,LTD. wireless router models, including WRC-2533GST2 and others, running firmware version 1. 69 and earlier. The flaw allows a remote authenticated attacker to upload files with dangerous types without proper restrictions, potentially leading to arbitrary code execution on the device. Exploitation requires authentication but no user interaction beyond that. Although no known exploits are currently in the wild, successful exploitation could compromise the integrity of the affected devices. The vulnerability impacts the device's integrity but not confidentiality or availability directly. European organizations using these ELECOM routers could face risks of device compromise, especially in environments where these models are deployed. Mitigation involves applying vendor patches once available, restricting administrative access, and monitoring for suspicious file uploads.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:36:23 UTC

Technical Analysis

CVE-2025-36519 is a vulnerability identified in several ELECOM CO.,LTD. wireless router models, including WRC-2533GST2, WRC-1167GST2, and related variants, specifically in firmware versions 1.69 and earlier. The issue stems from insufficient validation on file uploads, allowing authenticated remote attackers to upload files with dangerous types unrestrictedly. This flaw can be exploited to execute arbitrary code on the device, compromising its integrity. The attack vector requires network access and valid credentials, but no additional user interaction is necessary. The vulnerability does not impact confidentiality or availability directly but poses a risk to device integrity and control. No public exploits have been reported yet, but the presence of arbitrary code execution potential makes it a significant concern. The CVSS 3.0 base score of 4.3 reflects the medium severity, factoring in network attack vector, low attack complexity, and required privileges. The vulnerability affects a range of ELECOM routers widely used in small to medium enterprise and possibly home environments. The lack of available patches at the time of reporting necessitates interim mitigations to reduce risk. Attackers exploiting this vulnerability could gain persistent control over affected devices, potentially using them as footholds for further network compromise or lateral movement.

Potential Impact

For European organizations, the primary impact of CVE-2025-36519 lies in the potential compromise of network infrastructure devices, specifically ELECOM wireless routers. Successful exploitation could allow attackers to execute arbitrary code, leading to unauthorized configuration changes, installation of malicious firmware, or use of the device as a pivot point for further attacks within the network. This undermines the integrity of network operations and could facilitate espionage, data exfiltration, or disruption of services indirectly. Organizations relying on these routers for critical connectivity or security segmentation may face increased risk of persistent intrusions. The requirement for authentication limits exposure but does not eliminate risk, especially if credential management is weak or default credentials are in use. Given the medium severity, the threat is moderate but could escalate if combined with other vulnerabilities or poor security practices. European entities in sectors such as telecommunications, manufacturing, or SMEs using ELECOM equipment should be particularly vigilant.

Mitigation Recommendations

1. Apply firmware updates from ELECOM as soon as they are released to address this vulnerability. 2. Restrict administrative access to the routers by limiting management interfaces to trusted IP addresses or VPNs. 3. Enforce strong authentication mechanisms, including changing default credentials and implementing multi-factor authentication if supported. 4. Monitor router logs and network traffic for unusual file upload activities or unauthorized access attempts. 5. Segment network infrastructure to isolate critical devices and reduce the attack surface. 6. Disable or restrict file upload functionality if not required for normal operations. 7. Conduct regular security audits and vulnerability assessments on network devices. 8. Educate network administrators about the risks of this vulnerability and best practices for secure device management. 9. Consider deploying network intrusion detection systems capable of identifying anomalous behavior related to device compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-06-17T00:53:00.646Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 685a2f8edec26fc862d90947

Added to database: 6/24/2025, 4:54:38 AM

Last enriched: 2/4/2026, 8:36:23 AM

Last updated: 2/4/2026, 11:45:58 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats