CVE-2026-26048: CWE-306 in Jinan USR IOT Technology Limited (PUSR) USR-W610
CVE-2026-26048 affects the USR-W610 Wi-Fi router by Jinan USR IOT Technology Limited and involves a lack of management frame protection. This vulnerability allows attackers to send forged deauthentication and disassociation frames without authentication or encryption. Exploiting this flaw can disrupt legitimate Wi-Fi connections, causing denial-of-service (DoS) conditions. The vulnerability is rated high severity with a CVSS score of 7. 5, indicating network-level attack vector, low complexity, no privileges or user interaction required, and impacts confidentiality. No known exploits are currently reported in the wild. Organizations using the USR-W610 router should prioritize mitigation to prevent potential service disruptions. Countries with significant deployment of this product and critical infrastructure relying on it are at higher risk. Immediate patching or configuration changes to enable management frame protection, if available, are recommended to mitigate this threat.
AI Analysis
Technical Summary
CVE-2026-26048 is a vulnerability in the USR-W610 Wi-Fi router manufactured by Jinan USR IOT Technology Limited (PUSR). The core issue is the absence of management frame protection, a security feature defined in the IEEE 802.11w standard that protects management frames such as deauthentication and disassociation frames from being forged or tampered with. Without this protection, an attacker within wireless range can craft and broadcast spoofed deauthentication or disassociation frames to clients connected to the router, forcibly disconnecting them from the network. This attack does not require any authentication or user interaction, making it relatively easy to execute. The vulnerability impacts confidentiality by potentially allowing attackers to disrupt network communications and possibly intercept or manipulate traffic during reconnection attempts. The CVSS 3.1 score of 7.5 reflects a high severity due to the network attack vector, low attack complexity, and no required privileges or user interaction. Although no exploits are currently known in the wild, the vulnerability poses a significant risk of denial-of-service attacks against affected routers, which could impact business operations and critical services relying on stable Wi-Fi connectivity. The lack of patch links suggests that no official fix has been released yet, increasing the urgency for interim mitigations.
Potential Impact
The primary impact of this vulnerability is denial-of-service through forced disconnection of legitimate Wi-Fi clients. This can disrupt business operations, cause loss of productivity, and degrade user experience. In environments where Wi-Fi connectivity is critical—such as healthcare, manufacturing, or public safety—such disruptions could have severe consequences. Additionally, repeated forced disconnections could be leveraged as part of a larger attack chain to facilitate further network intrusion or data interception. The confidentiality impact is rated high because attackers can disrupt secure communications and potentially force clients to reconnect to rogue access points if combined with other attacks. Since the attack requires no privileges or user interaction and can be executed remotely within wireless range, the scope of affected systems is broad wherever the USR-W610 router is deployed. The absence of management frame protection also indicates a fundamental security design weakness that could be exploited by relatively unsophisticated attackers.
Mitigation Recommendations
1. Enable Management Frame Protection (MFP) or 802.11w on the USR-W610 router if the feature is supported but disabled by default. This is the most effective mitigation against forged deauthentication and disassociation frames. 2. If no firmware update is available, consider segmenting critical Wi-Fi networks and limiting wireless access to trusted devices only, reducing the attack surface. 3. Deploy wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor and alert on suspicious deauthentication frames or unusual disassociation events. 4. Encourage users to connect only to trusted networks and educate them about the risks of forced disconnections and potential rogue access points. 5. Work with the vendor to obtain firmware updates or patches that address this vulnerability. 6. As a temporary workaround, consider using wired connections for critical devices where feasible to avoid wireless disruptions. 7. Regularly audit wireless network configurations and logs to detect and respond to potential exploitation attempts promptly.
Affected Countries
China, United States, Germany, United Kingdom, India, Brazil, Russia, South Korea, Japan, France
CVE-2026-26048: CWE-306 in Jinan USR IOT Technology Limited (PUSR) USR-W610
Description
CVE-2026-26048 affects the USR-W610 Wi-Fi router by Jinan USR IOT Technology Limited and involves a lack of management frame protection. This vulnerability allows attackers to send forged deauthentication and disassociation frames without authentication or encryption. Exploiting this flaw can disrupt legitimate Wi-Fi connections, causing denial-of-service (DoS) conditions. The vulnerability is rated high severity with a CVSS score of 7. 5, indicating network-level attack vector, low complexity, no privileges or user interaction required, and impacts confidentiality. No known exploits are currently reported in the wild. Organizations using the USR-W610 router should prioritize mitigation to prevent potential service disruptions. Countries with significant deployment of this product and critical infrastructure relying on it are at higher risk. Immediate patching or configuration changes to enable management frame protection, if available, are recommended to mitigate this threat.
AI-Powered Analysis
Technical Analysis
CVE-2026-26048 is a vulnerability in the USR-W610 Wi-Fi router manufactured by Jinan USR IOT Technology Limited (PUSR). The core issue is the absence of management frame protection, a security feature defined in the IEEE 802.11w standard that protects management frames such as deauthentication and disassociation frames from being forged or tampered with. Without this protection, an attacker within wireless range can craft and broadcast spoofed deauthentication or disassociation frames to clients connected to the router, forcibly disconnecting them from the network. This attack does not require any authentication or user interaction, making it relatively easy to execute. The vulnerability impacts confidentiality by potentially allowing attackers to disrupt network communications and possibly intercept or manipulate traffic during reconnection attempts. The CVSS 3.1 score of 7.5 reflects a high severity due to the network attack vector, low attack complexity, and no required privileges or user interaction. Although no exploits are currently known in the wild, the vulnerability poses a significant risk of denial-of-service attacks against affected routers, which could impact business operations and critical services relying on stable Wi-Fi connectivity. The lack of patch links suggests that no official fix has been released yet, increasing the urgency for interim mitigations.
Potential Impact
The primary impact of this vulnerability is denial-of-service through forced disconnection of legitimate Wi-Fi clients. This can disrupt business operations, cause loss of productivity, and degrade user experience. In environments where Wi-Fi connectivity is critical—such as healthcare, manufacturing, or public safety—such disruptions could have severe consequences. Additionally, repeated forced disconnections could be leveraged as part of a larger attack chain to facilitate further network intrusion or data interception. The confidentiality impact is rated high because attackers can disrupt secure communications and potentially force clients to reconnect to rogue access points if combined with other attacks. Since the attack requires no privileges or user interaction and can be executed remotely within wireless range, the scope of affected systems is broad wherever the USR-W610 router is deployed. The absence of management frame protection also indicates a fundamental security design weakness that could be exploited by relatively unsophisticated attackers.
Mitigation Recommendations
1. Enable Management Frame Protection (MFP) or 802.11w on the USR-W610 router if the feature is supported but disabled by default. This is the most effective mitigation against forged deauthentication and disassociation frames. 2. If no firmware update is available, consider segmenting critical Wi-Fi networks and limiting wireless access to trusted devices only, reducing the attack surface. 3. Deploy wireless intrusion detection/prevention systems (WIDS/WIPS) to monitor and alert on suspicious deauthentication frames or unusual disassociation events. 4. Encourage users to connect only to trusted networks and educate them about the risks of forced disconnections and potential rogue access points. 5. Work with the vendor to obtain firmware updates or patches that address this vulnerability. 6. As a temporary workaround, consider using wired connections for critical devices where feasible to avoid wireless disruptions. 7. Regularly audit wireless network configurations and logs to detect and respond to potential exploitation attempts promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-02-10T15:52:10.274Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6998c9e1be58cf853bab6ab0
Added to database: 2/20/2026, 8:53:53 PM
Last enriched: 2/20/2026, 8:55:26 PM
Last updated: 2/21/2026, 6:25:24 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2863: Path Traversal in feng_ha_ha ssm-erp
MediumCVE-2026-2861: Information Disclosure in Foswiki
MediumCVE-2026-27212: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in nolimits4web swiper
CriticalCVE-2026-26047: Uncontrolled Resource Consumption
MediumCVE-2026-26046: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.