PatchSiren cyber security CVE debrief
CVE-2026-22550 Elecom CVE debrief
CVE-2026-22550 is a high-severity OS command injection vulnerability affecting certain ELECOM wireless LAN products. According to the vendor and NVD records, a crafted request from a logged-in user may lead to arbitrary OS command execution. The affected firmware entries in NVD are for WRC-X1500GSA-B and WRC-X1500GS-B, both up to firmware 1.13.
- Vendor
- Elecom
- Product
- CVE-2026-22550
- CVSS
- HIGH 8.6
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-03
- Original CVE updated
- 2026-05-12
- Advisory published
- 2026-02-03
- Advisory updated
- 2026-05-12
Who should care
Network administrators, security teams, and anyone managing ELECOM wireless LAN devices should review this issue, especially where the affected models are used for wireless access or device management.
Technical summary
NVD lists this as CWE-78 (OS Command Injection) with CVSS 4.0 vector AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H. The vulnerability is network-reachable but requires high privileges, consistent with the description that a crafted request from a logged-in user can trigger arbitrary OS command execution on affected firmware. NVD currently identifies vulnerable firmware for ELECOM WRC-X1500GSA-B and WRC-X1500GS-B through version 1.13.
Defensive priority
High. The issue can lead to full command execution on impacted devices, so affected firmware should be treated as a priority for inventory, patching, and access hardening.
Recommended defensive actions
- Identify whether any ELECOM WRC-X1500GSA-B or WRC-X1500GS-B devices are deployed, and confirm the installed firmware version.
- Apply the vendor/JVN remediation guidance as soon as possible for any affected firmware, using only official ELECOM instructions.
- Restrict administrative and authenticated access to device management interfaces to the minimum necessary set of users and networks.
- Review logs and configuration changes for unexpected management requests or signs of command execution attempts.
- If immediate patching is not possible, isolate affected devices and reduce exposure of management interfaces until remediation is complete.
Evidence notes
This debrief is based on the official NVD record for CVE-2026-22550 and the linked JVN and ELECOM advisories. NVD records the vulnerability as modified on 2026-05-12 and published on 2026-02-03. The vendor-linked references describe the issue as OS command injection and identify affected ELECOM wireless LAN firmware.
Official resources
-
CVE-2026-22550 CVE record
CVE.org
-
CVE-2026-22550 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE-2026-22550 was published on 2026-02-03 and last modified on 2026-05-12. The official records identify ELECOM wireless LAN firmware as the affected product area and describe the issue as OS command injection.