Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Improper CSRF Token Handling in ELECOM Wireless LAN Access Point Firmware |
Wed, 13 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ELECOM wireless LAN access point devices implement CSRF protection mechanism, but with inadequate handling of CSRF tokens. If a user views a malicious page while logged in, the user may be tricked to do unintended operations. | |
| Weaknesses | CWE-344 | |
| References |
| |
| Metrics |
cvssV3_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-05-13T15:04:39.032Z
Reserved: 2026-05-07T05:47:12.897Z
Link: CVE-2026-42961
Updated: 2026-05-13T15:04:00.000Z
Status : Deferred
Published: 2026-05-13T13:16:44.337
Modified: 2026-05-13T15:47:10.327
Link: CVE-2026-42961
No data.
OpenCVE Enrichment
Updated: 2026-05-13T14:30:36Z