CVE-2026-32326: Missing authentication for critical function in Sharp Corporation home 5G HR01
SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over.
AI Analysis
Technical Summary
CVE-2026-32326 is a vulnerability identified in Sharp Corporation's home 5G HR01 router series, specifically firmware versions 38JP_0_490 and earlier. The core issue is the absence of authentication enforcement on certain web APIs, which allows unauthenticated users on the local network to retrieve sensitive device information. This lack of authentication can lead to an attacker gaining insights into the device configuration and status without credentials. More critically, if the router's administrative password remains at the factory default, an attacker can exploit this vulnerability to take over the device, potentially gaining administrative control. The vulnerability has a CVSS 3.0 base score of 5.7, reflecting medium severity, with an attack vector requiring local network access (AV:A), low attack complexity (AC:L), and privileges required (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No public exploits have been reported to date, and no patches have been linked yet. This vulnerability highlights the risk of insufficient authentication controls on embedded device management interfaces and the dangers of unchanged default credentials. It underscores the importance of secure device configuration and firmware updates in consumer networking equipment.
Potential Impact
The vulnerability allows unauthorized local network attackers to access sensitive device information without authentication, potentially exposing configuration details that could facilitate further attacks. If the administrative password is not changed from its default, attackers can fully compromise the router, gaining administrative control. This can lead to unauthorized changes in network configuration, interception or redirection of network traffic, and the creation of persistent backdoors. The impact is primarily on confidentiality and device control, with no direct impact on data integrity or availability reported. Organizations relying on these routers for home or small office connectivity may face increased risk of network compromise, especially if default credentials are used. The lack of authentication on critical APIs also increases the attack surface and could be leveraged in multi-stage attacks. While exploitation requires local network access, compromised devices could be used as pivot points for lateral movement within organizational networks.
Mitigation Recommendations
1. Immediately change the default administrative password on all affected Sharp home 5G HR01 routers to a strong, unique password to prevent takeover. 2. Restrict local network access to the router’s management interface by implementing network segmentation and firewall rules that limit access to trusted devices only. 3. Monitor network traffic for unusual activity or unauthorized access attempts to the router’s web APIs. 4. Regularly check for and apply firmware updates from Sharp Corporation once patches addressing this vulnerability are released. 5. Disable remote management features if not required to reduce exposure. 6. Educate users on the risks of default credentials and the importance of secure configuration of network devices. 7. Consider deploying network intrusion detection systems capable of identifying anomalous router management traffic. 8. For organizations, implement network access control (NAC) to ensure only authorized devices can connect to sensitive network segments.
Affected Countries
Japan, United States, Germany, United Kingdom, France, Australia, Canada, South Korea, Taiwan
CVE-2026-32326: Missing authentication for critical function in Sharp Corporation home 5G HR01
Description
SHARP routers do not perform authentication for some web APIs. The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be taken over.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32326 is a vulnerability identified in Sharp Corporation's home 5G HR01 router series, specifically firmware versions 38JP_0_490 and earlier. The core issue is the absence of authentication enforcement on certain web APIs, which allows unauthenticated users on the local network to retrieve sensitive device information. This lack of authentication can lead to an attacker gaining insights into the device configuration and status without credentials. More critically, if the router's administrative password remains at the factory default, an attacker can exploit this vulnerability to take over the device, potentially gaining administrative control. The vulnerability has a CVSS 3.0 base score of 5.7, reflecting medium severity, with an attack vector requiring local network access (AV:A), low attack complexity (AC:L), and privileges required (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), with high confidentiality impact (C:H) but no impact on integrity or availability (I:N/A:N). No public exploits have been reported to date, and no patches have been linked yet. This vulnerability highlights the risk of insufficient authentication controls on embedded device management interfaces and the dangers of unchanged default credentials. It underscores the importance of secure device configuration and firmware updates in consumer networking equipment.
Potential Impact
The vulnerability allows unauthorized local network attackers to access sensitive device information without authentication, potentially exposing configuration details that could facilitate further attacks. If the administrative password is not changed from its default, attackers can fully compromise the router, gaining administrative control. This can lead to unauthorized changes in network configuration, interception or redirection of network traffic, and the creation of persistent backdoors. The impact is primarily on confidentiality and device control, with no direct impact on data integrity or availability reported. Organizations relying on these routers for home or small office connectivity may face increased risk of network compromise, especially if default credentials are used. The lack of authentication on critical APIs also increases the attack surface and could be leveraged in multi-stage attacks. While exploitation requires local network access, compromised devices could be used as pivot points for lateral movement within organizational networks.
Mitigation Recommendations
1. Immediately change the default administrative password on all affected Sharp home 5G HR01 routers to a strong, unique password to prevent takeover. 2. Restrict local network access to the router’s management interface by implementing network segmentation and firewall rules that limit access to trusted devices only. 3. Monitor network traffic for unusual activity or unauthorized access attempts to the router’s web APIs. 4. Regularly check for and apply firmware updates from Sharp Corporation once patches addressing this vulnerability are released. 5. Disable remote management features if not required to reduce exposure. 6. Educate users on the risks of default credentials and the importance of secure configuration of network devices. 7. Consider deploying network intrusion detection systems capable of identifying anomalous router management traffic. 8. For organizations, implement network access control (NAC) to ensure only authorized devices can connect to sensitive network segments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2026-03-12T06:43:35.484Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 69c39653f4197a8e3b2f5482
Added to database: 3/25/2026, 8:01:23 AM
Last enriched: 3/25/2026, 8:15:55 AM
Last updated: 5/8/2026, 11:45:08 AM
Views: 100
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.