CVE-2025-36519

4.3 MEDIUM

📋 TL;DR

This vulnerability allows remote authenticated attackers to upload malicious files to affected ELECOM wireless routers, potentially leading to arbitrary code execution. Attackers must have valid credentials to exploit this flaw. The issue affects multiple WRC-series router models running firmware version 1.69 or earlier.

💻 Affected Systems

Products:
  • WRC-2533GST2
  • WRC-1167GST2
  • WRC-2533GS2V-B
  • WRC-2533GS2-B
  • WRC-2533GS2-W
  • WRC-1167GS2-B
  • WRC-1167GS2H-B
Versions: v1.69 and earlier
Operating Systems: Router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models with default configurations are vulnerable. Authentication required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the router allowing attackers to intercept network traffic, modify device configuration, pivot to internal networks, or establish persistent backdoors.

🟠

Likely Case

Router compromise leading to network disruption, credential theft, or deployment of malware to connected devices.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent lateral movement from compromised routers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the router's web interface. The vulnerability is in file upload functionality without proper validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.70 or later

Vendor Advisory: https://www.elecom.co.jp/news/security/20250624-01/

Restart Required: Yes

Instructions:

1. Log into router admin interface. 2. Navigate to firmware update section. 3. Download latest firmware from ELECOM support site. 4. Upload and apply firmware update. 5. Reboot router after update completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit router admin interface access to trusted IP addresses only

Disable Remote Management

all

Turn off WAN-side access to router administration interface

🧯 If You Can't Patch

  • Segment affected routers on isolated network VLANs
  • Implement strict firewall rules to limit router communication to management networks only

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is 1.69 or earlier, device is vulnerable.

Check Version:

Login to router web interface and check System Status or Firmware Information page

Verify Fix Applied:

Confirm firmware version is 1.70 or later in router admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to router admin interface
  • Multiple failed login attempts followed by successful login and file upload

Network Indicators:

  • Unexpected outbound connections from router
  • Unusual traffic patterns from router to external IPs

SIEM Query:

source="router_logs" AND (event="file_upload" OR event="firmware_update") AND user!="admin_legitimate"

🔗 References

📤 Share & Export