Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26048: CWE-306 in Jinan USR IOT Technology Limited (PUSR) USR-W610

0
High
VulnerabilityCVE-2026-26048cvecve-2026-26048cwe-306
Published: Fri Feb 20 2026 (02/20/2026, 16:06:17 UTC)
Source: CVE Database V5
Vendor/Project: Jinan USR IOT Technology Limited (PUSR)
Product: USR-W610

Description

The Wi-Fi router is vulnerable to de-authentication attacks due to the absence of management frame protection, allowing forged deauthentication and disassociation frames to be broadcast without authentication or encryption. An attacker can use this to cause unauthorized disruptions and create a denial-of-service condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:22:43 UTC

Technical Analysis

CVE-2026-26048 identifies a vulnerability in the USR-W610 Wi-Fi router manufactured by Jinan USR IOT Technology Limited. The core issue stems from the absence of management frame protection, a security feature designed to authenticate and encrypt management frames such as deauthentication and disassociation messages in Wi-Fi networks. Without this protection, attackers can forge these frames and broadcast them to connected clients, causing them to disconnect from the network unexpectedly. This type of attack is commonly known as a deauthentication attack and is a form of denial-of-service (DoS) against wireless clients. The vulnerability is classified under CWE-306, which refers to missing authentication for critical functions, highlighting that the router fails to verify the legitimacy of management frames. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H) but no impact on integrity or availability. The lack of management frame protection means attackers can disrupt wireless communications without needing to authenticate or interact with users, making exploitation straightforward. Although no public exploits are currently known, the vulnerability poses a significant risk to environments using this router, especially where wireless connectivity is critical. The affected version is listed as '0', which likely indicates all current firmware versions or an unspecified version. No patches or mitigations have been officially released at the time of publication. This vulnerability can be leveraged to cause service disruptions, potentially impacting sensitive communications and operational continuity.

Potential Impact

The primary impact of CVE-2026-26048 is the ability for attackers to cause denial-of-service conditions by forcibly disconnecting clients from the Wi-Fi network through forged deauthentication frames. This can disrupt business operations, especially in environments relying heavily on wireless connectivity for critical services. The confidentiality impact is rated high because attackers can potentially intercept or manipulate network traffic during forced reconnections or exploit the disruption to facilitate further attacks. Although integrity and availability impacts are not directly affected, the disruption of service can lead to operational downtime and loss of productivity. Organizations using the USR-W610 router in enterprise, industrial, or critical infrastructure settings may face increased risk of targeted attacks aiming to disrupt communications. The ease of exploitation without requiring authentication or user interaction broadens the threat landscape, allowing remote attackers within wireless range to execute the attack. This vulnerability could also be exploited in coordinated attacks to cause widespread network outages or to distract security teams while other attacks are conducted. The lack of known exploits in the wild suggests the vulnerability is either newly discovered or underreported, but the potential for impact remains significant.

Mitigation Recommendations

1. Immediately assess whether the USR-W610 router firmware supports management frame protection (MFP) or 802.11w standards and enable this feature if available. 2. If MFP is not supported, consider deploying network segmentation to isolate critical wireless networks from less secure segments, limiting attack surface. 3. Implement wireless intrusion detection systems (WIDS) capable of detecting and alerting on deauthentication frame floods or anomalies. 4. Regularly monitor wireless network logs for unusual disassociation or deauthentication events that could indicate exploitation attempts. 5. Where possible, replace or upgrade affected routers with models that support robust management frame protection and have vendor patches available. 6. Educate network administrators about the risks of deauthentication attacks and ensure incident response plans include procedures for wireless DoS events. 7. Limit physical access to wireless infrastructure to reduce the risk of local attackers exploiting the vulnerability. 8. Coordinate with the vendor for firmware updates or patches addressing this vulnerability and apply them promptly once available. 9. Consider deploying additional authentication mechanisms such as WPA3, which inherently includes management frame protection, to enhance wireless security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-10T15:52:10.274Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6998c9e1be58cf853bab6ab0

Added to database: 2/20/2026, 8:53:53 PM

Last enriched: 2/28/2026, 2:22:43 PM

Last updated: 4/7/2026, 8:30:36 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses