Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote OS Command Injection in Elecom Wireless LAN Access Point Username Parameter |
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T15:07:12.520Z
Reserved: 2026-05-07T05:47:07.064Z
Link: CVE-2026-42062
Updated: 2026-05-13T15:07:07.266Z
Status : Deferred
Published: 2026-05-13T13:16:43.570
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-42062
No data.
OpenCVE Enrichment
Updated: 2026-05-13T14:30:36Z