Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32326: Missing authentication for critical function in Sharp Corporation home 5G HR01

0
Medium
VulnerabilityCVE-2026-32326cvecve-2026-32326
Published: Wed Mar 25 2026 (03/25/2026, 07:38:20 UTC)
Source: CVE Database V5
Vendor/Project: Sharp Corporation
Product: home 5G HR01

Description

SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 08:15:55 UTC

Technical Analysis

CVE-2026-32326 is a vulnerability identified in Sharp Corporation's home 5G HR01 router series, specifically firmware versions 38JP_0_490 and earlier. The core issue is the absence of authentication enforcement on certain web APIs, which allows unauthenticated users on the local network to retrieve sensitive device information. This lack of authentication can lead to an attacker gaining insights into the device configuration and status without credentials. More critically, if the router's administrative password remains at the factory default, an attacker can exploit this vulnerability to take over the device, potentially gaining administrative control. The vulnerability has a CVSS 3.0 base score of 5.7, reflecting medium severity, with an attack vector requiring local network access (AV:A), low attack complexity (AC:L), and privileges required (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No public exploits have been reported to date, and no patches have been linked yet. This vulnerability highlights the risk of insufficient authentication controls on embedded device management interfaces and the dangers of unchanged default credentials. It underscores the importance of secure device configuration and firmware updates in consumer networking equipment.

Potential Impact

The vulnerability allows unauthorized local network attackers to access sensitive device information without authentication, potentially exposing configuration details that could facilitate further attacks. If the administrative password is not changed from its default, attackers can fully compromise the router, gaining administrative control. This can lead to unauthorized changes in network configuration, interception or redirection of network traffic, and the creation of persistent backdoors. The impact is primarily on confidentiality and device control, with no direct impact on data integrity or availability reported. Organizations relying on these routers for home or small office connectivity may face increased risk of network compromise, especially if default credentials are used. The lack of authentication on critical APIs also increases the attack surface and could be leveraged in multi-stage attacks. While exploitation requires local network access, compromised devices could be used as pivot points for lateral movement within organizational networks.

Mitigation Recommendations

1. Immediately change the default administrative password on all affected Sharp home 5G HR01 routers to a strong, unique password to prevent takeover. 2. Restrict local network access to the router’s management interface by implementing network segmentation and firewall rules that limit access to trusted devices only. 3. Monitor network traffic for unusual activity or unauthorized access attempts to the router’s web APIs. 4. Regularly check for and apply firmware updates from Sharp Corporation once patches addressing this vulnerability are released. 5. Disable remote management features if not required to reduce exposure. 6. Educate users on the risks of default credentials and the importance of secure configuration of network devices. 7. Consider deploying network intrusion detection systems capable of identifying anomalous router management traffic. 8. For organizations, implement network access control (NAC) to ensure only authorized devices can connect to sensitive network segments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2026-03-12T06:43:35.484Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 69c39653f4197a8e3b2f5482

Added to database: 3/25/2026, 8:01:23 AM

Last enriched: 3/25/2026, 8:15:55 AM

Last updated: 5/8/2026, 11:45:08 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses