CVE-2026-24465

Stack-based buffer overflow vulnerability exists in ELECOM wireless LAN access point devices. A crafted packet may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:elecom:wab-s300iw-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw-pd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:elecom:wab-s733iw-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s733iw-pd:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gsa-b:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gs-b:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:elecom:wab-s300iw2-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw2-pd:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:elecom:wab-s300iw-ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw-ac:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:elecom:wab-s733iw2-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s733iw2-pd:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:elecom:wab-s733iw-ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s733iw-ac:*:*:*:*:*:*:*:*

History

14 Apr 2026, 12:59

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de desbordamiento de búfer basado en pila existe en dispositivos de punto de acceso LAN inalámbrica ELECOM. Un paquete manipulado puede conducir a ejecución de código arbitrario.
First Time Elecom wab-s300iw-pd Firmware
Elecom wab-s300iw-pd
Elecom wab-s300iw2-pd
Elecom wab-s300iw2-pd Firmware
Elecom wab-s733iw2-pd
Elecom wab-s733iw-pd Firmware
Elecom wrc-x1500gsa-b
Elecom wrc-x1500gs-b
Elecom
Elecom wab-s300iw-ac Firmware
Elecom wab-s300iw-ac
Elecom wrc-x1500gs-b Firmware
Elecom wab-s733iw2-pd Firmware
Elecom wab-s733iw-ac Firmware
Elecom wrc-x1500gsa-b Firmware
Elecom wab-s733iw-pd
Elecom wab-s733iw-ac
CPE cpe:2.3:h:elecom:wab-s733iw-pd:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gsa-b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw-ac:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s300iw2-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gs-b:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s300iw-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw2-pd:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s733iw-ac:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s300iw-ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s300iw-pd:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s733iw-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s733iw-ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wab-s733iw2-pd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wab-s733iw2-pd:*:*:*:*:*:*:*:*
cpe:2.3:h:elecom:wrc-x1500gsa-b:*:*:*:*:*:*:*:*
cpe:2.3:o:elecom:wrc-x1500gs-b_firmware:*:*:*:*:*:*:*:*
References () https://jvn.jp/en/jp/JVN94012927/ - () https://jvn.jp/en/jp/JVN94012927/ - Third Party Advisory
References () https://www.elecom.co.jp/news/security/20260203-01/ - () https://www.elecom.co.jp/news/security/20260203-01/ - Vendor Advisory
References () https://www.elecom.co.jp/news/security/20260203-02/ - () https://www.elecom.co.jp/news/security/20260203-02/ - Vendor Advisory

03 Feb 2026, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 07:16

Updated : 2026-04-14 12:59


NVD link : CVE-2026-24465

Mitre link : CVE-2026-24465

CVE.ORG link : CVE-2026-24465


JSON object : View

Products Affected

elecom

  • wab-s733iw-pd
  • wab-s300iw-pd
  • wab-s300iw-ac_firmware
  • wrc-x1500gs-b
  • wab-s300iw2-pd
  • wrc-x1500gsa-b_firmware
  • wab-s300iw2-pd_firmware
  • wab-s300iw-pd_firmware
  • wab-s733iw2-pd_firmware
  • wrc-x1500gsa-b
  • wab-s733iw-ac_firmware
  • wab-s733iw-ac
  • wrc-x1500gs-b_firmware
  • wab-s733iw2-pd
  • wab-s300iw-ac
  • wab-s733iw-pd_firmware
CWE
CWE-121

Stack-based Buffer Overflow