CVE-2025-53472

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in ELECOM WRC-BE36QS-B and WRC-W701-B wireless routers. Remote attackers who can authenticate to the WebGUI can execute arbitrary operating system commands on the device. This affects all users of these specific router models.

💻 Affected Systems

Products:
  • ELECOM WRC-BE36QS-B
  • ELECOM WRC-W701-B
Versions: All versions prior to firmware updates
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the WebGUI interface; exploitation requires authentication to the router's web administration interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, intercept all network traffic, pivot to internal networks, or brick the device.

🟠

Likely Case

Attacker gains full control of the router to modify configurations, intercept traffic, or use as a foothold for further attacks.

🟢

If Mitigated

Limited impact if strong authentication and network segmentation prevent unauthorized WebGUI access.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices, and authenticated WebGUI access could be obtained through credential compromise or default credentials.
🏢 Internal Only: MEDIUM - Internal attackers with network access could exploit if they obtain WebGUI credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Once authenticated, command injection is typically straightforward.

Exploitation requires valid WebGUI credentials, which could be default or weak credentials in many deployments.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.elecom.co.jp/news/security/20250722-01/

Restart Required: Yes

Instructions:

1. Visit ELECOM support website. 2. Download latest firmware for your specific model. 3. Log into router WebGUI. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router after update completes.

🔧 Temporary Workarounds

Disable WebGUI remote access

all

Prevent external access to WebGUI administration interface

Configure firewall to block WAN access to router admin ports (typically 80/443)

Implement strong authentication

all

Use complex unique passwords and enable multi-factor authentication if available

Change default admin credentials to strong unique passwords

🧯 If You Can't Patch

  • Isolate router on separate VLAN with strict network segmentation
  • Implement network monitoring for unusual outbound connections from router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against vendor advisory; if running unpatched version, device is vulnerable.

Check Version:

Log into WebGUI and check firmware version in System Status or Administration section

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful login
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • Traffic redirection or DNS changes
  • Unexpected services running on router

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export