Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices use a hard-coded cryptographic key when creating backups of configuration files. An attacker who knows the encryption key can tamper the configuration file of the product, and a victim administrator may be tricked to use a crafted configuration file. | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T18:26:26.218Z
Reserved: 2026-05-07T05:47:06.075Z
Link: CVE-2026-25107
Updated: 2026-05-13T18:26:22.969Z
Status : Deferred
Published: 2026-05-13T13:16:37.160
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-25107
No data.
OpenCVE Enrichment
Updated: 2026-05-13T15:00:06Z