CVE-2026-4619: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NEC Platforms, Ltd. Aterm WX3600HP
CVE-2026-4619 is a path traversal vulnerability affecting NEC Platforms, Ltd. 's Aterm WX3600HP router series before version 1. 5. 3. This flaw allows an attacker with high privileges to write arbitrary files over the network by bypassing pathname restrictions. Exploitation requires network access and high authentication privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized file modification. Although no known exploits are currently in the wild, the risk remains significant for affected devices. The CVSS 4. 0 score rates this vulnerability as medium severity, reflecting the complexity of exploitation and required privileges.
AI Analysis
Technical Summary
CVE-2026-4619 is a path traversal vulnerability classified under CWE-22, found in NEC Platforms, Ltd.'s Aterm WX3600HP router series prior to version 1.5.3. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories and write arbitrary files on the device via network requests. This can lead to overwriting critical system files or configuration data, potentially enabling persistent compromise or denial of service. Exploitation requires the attacker to have high-level privileges (PR:H) and network access (AV:N), but does not require user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability, with high impact on integrity and availability, and low impact on confidentiality. The CVSS 4.0 vector indicates high attack complexity (AC:H), no privileges required for attack initiation (AT:N), and no scope change (SC:N). No public exploits are known at this time, but the vulnerability's nature makes it a serious concern for affected organizations. The lack of available patches necessitates immediate mitigation efforts to reduce exposure. This vulnerability is particularly relevant for environments relying on NEC's Aterm WX3600HP routers, commonly deployed in enterprise and service provider networks.
Potential Impact
The path traversal vulnerability allows attackers with high privileges to overwrite arbitrary files on the affected router, which can lead to several severe consequences. These include unauthorized modification or deletion of system and configuration files, potentially resulting in device malfunction, denial of service, or persistent backdoor installation. The integrity of the device is directly compromised, and availability may be disrupted if critical files are corrupted. Confidentiality impact is lower but still possible if attackers modify files to capture or redirect sensitive data. Organizations relying on these routers for network infrastructure risk operational disruption and potential lateral movement by attackers within their networks. The medium CVSS score reflects the requirement for high privileges and attack complexity, but the potential damage to network infrastructure is significant. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit code.
Mitigation Recommendations
1. Upgrade the Aterm WX3600HP firmware to version 1.5.3 or later once available to apply the official patch addressing the path traversal vulnerability. 2. Restrict network access to the router's management interfaces using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. 3. Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication, to reduce the risk of unauthorized high-privilege access. 4. Monitor router logs and file integrity regularly to detect unusual file modifications or access patterns indicative of exploitation attempts. 5. Disable unnecessary services and interfaces on the router to minimize the attack surface. 6. Implement network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying path traversal attempts. 7. If patching is delayed, consider temporary compensating controls such as access control lists (ACLs) and strict administrative access policies. 8. Educate network administrators about the vulnerability and encourage vigilance for suspicious activity related to router management.
Affected Countries
Japan, South Korea, China, United States, Germany, United Kingdom, France, Australia, Singapore, Taiwan
CVE-2026-4619: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NEC Platforms, Ltd. Aterm WX3600HP
Description
CVE-2026-4619 is a path traversal vulnerability affecting NEC Platforms, Ltd. 's Aterm WX3600HP router series before version 1. 5. 3. This flaw allows an attacker with high privileges to write arbitrary files over the network by bypassing pathname restrictions. Exploitation requires network access and high authentication privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized file modification. Although no known exploits are currently in the wild, the risk remains significant for affected devices. The CVSS 4. 0 score rates this vulnerability as medium severity, reflecting the complexity of exploitation and required privileges.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4619 is a path traversal vulnerability classified under CWE-22, found in NEC Platforms, Ltd.'s Aterm WX3600HP router series prior to version 1.5.3. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories and write arbitrary files on the device via network requests. This can lead to overwriting critical system files or configuration data, potentially enabling persistent compromise or denial of service. Exploitation requires the attacker to have high-level privileges (PR:H) and network access (AV:N), but does not require user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability, with high impact on integrity and availability, and low impact on confidentiality. The CVSS 4.0 vector indicates high attack complexity (AC:H), no privileges required for attack initiation (AT:N), and no scope change (SC:N). No public exploits are known at this time, but the vulnerability's nature makes it a serious concern for affected organizations. The lack of available patches necessitates immediate mitigation efforts to reduce exposure. This vulnerability is particularly relevant for environments relying on NEC's Aterm WX3600HP routers, commonly deployed in enterprise and service provider networks.
Potential Impact
The path traversal vulnerability allows attackers with high privileges to overwrite arbitrary files on the affected router, which can lead to several severe consequences. These include unauthorized modification or deletion of system and configuration files, potentially resulting in device malfunction, denial of service, or persistent backdoor installation. The integrity of the device is directly compromised, and availability may be disrupted if critical files are corrupted. Confidentiality impact is lower but still possible if attackers modify files to capture or redirect sensitive data. Organizations relying on these routers for network infrastructure risk operational disruption and potential lateral movement by attackers within their networks. The medium CVSS score reflects the requirement for high privileges and attack complexity, but the potential damage to network infrastructure is significant. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit code.
Mitigation Recommendations
1. Upgrade the Aterm WX3600HP firmware to version 1.5.3 or later once available to apply the official patch addressing the path traversal vulnerability. 2. Restrict network access to the router's management interfaces using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. 3. Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication, to reduce the risk of unauthorized high-privilege access. 4. Monitor router logs and file integrity regularly to detect unusual file modifications or access patterns indicative of exploitation attempts. 5. Disable unnecessary services and interfaces on the router to minimize the attack surface. 6. Implement network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying path traversal attempts. 7. If patching is delayed, consider temporary compensating controls such as access control lists (ACLs) and strict administrative access policies. 8. Educate network administrators about the vulnerability and encourage vigilance for suspicious activity related to router management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NEC
- Date Reserved
- 2026-03-23T06:04:46.181Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c671313c064ed76fa3fd88
Added to database: 3/27/2026, 11:59:45 AM
Last enriched: 3/27/2026, 12:14:52 PM
Last updated: 3/27/2026, 1:10:09 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.