Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OS Command Injection via Ping IP Address Parameter in ELECOM Wireless LAN Access Points |
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices contain an OS command injection vulnerability in processing of ping_ip_addr parameter. If processing a crafted request sent by a logged-in user, an arbitrary OS command may be executed. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T15:19:45.905Z
Reserved: 2026-05-07T05:47:11.955Z
Link: CVE-2026-35506
Updated: 2026-05-13T15:19:08.993Z
Status : Deferred
Published: 2026-05-13T13:16:40.880
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-35506
No data.
OpenCVE Enrichment
Updated: 2026-05-13T14:30:36Z