CVE-2025-53472
📋 TL;DR
This CVE describes an OS command injection vulnerability in ELECOM WRC-BE36QS-B and WRC-W701-B wireless routers. Remote attackers who can authenticate to the WebGUI can execute arbitrary operating system commands on the device. This affects all users of these specific router models.
💻 Affected Systems
- ELECOM WRC-BE36QS-B
- ELECOM WRC-W701-B
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attacker to install persistent backdoors, intercept all network traffic, pivot to internal networks, or brick the device.
Likely Case
Attacker gains full control of the router to modify configurations, intercept traffic, or use as a foothold for further attacks.
If Mitigated
Limited impact if strong authentication and network segmentation prevent unauthorized WebGUI access.
🎯 Exploit Status
Exploitation requires valid WebGUI credentials, which could be default or weak credentials in many deployments.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific firmware versions
Vendor Advisory: https://www.elecom.co.jp/news/security/20250722-01/
Restart Required: Yes
Instructions:
1. Visit ELECOM support website. 2. Download latest firmware for your specific model. 3. Log into router WebGUI. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router after update completes.
🔧 Temporary Workarounds
Disable WebGUI remote access
allPrevent external access to WebGUI administration interface
Configure firewall to block WAN access to router admin ports (typically 80/443)
Implement strong authentication
allUse complex unique passwords and enable multi-factor authentication if available
Change default admin credentials to strong unique passwords
🧯 If You Can't Patch
- Isolate router on separate VLAN with strict network segmentation
- Implement network monitoring for unusual outbound connections from router
🔍 How to Verify
Check if Vulnerable:
Check router firmware version against vendor advisory; if running unpatched version, device is vulnerable.
Check Version:
Log into WebGUI and check firmware version in System Status or Administration section
Verify Fix Applied:
Verify firmware version has been updated to patched version specified in vendor advisory.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts followed by successful login
- Unexpected configuration changes
Network Indicators:
- Unusual outbound connections from router
- Traffic redirection or DNS changes
- Unexpected services running on router
SIEM Query:
source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")