PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-29225 Jvn CVE debrief

CVE-2024-29225 is a medium-severity information disclosure issue in ELECOM wireless LAN routers. According to the published descriptions, a network-adjacent unauthenticated attacker can send a specially crafted request and obtain the device configuration file, which may contain sensitive information. The vulnerability was published on 2024-04-04 and is mapped to CWE-552 (Files or Directories Accessible to External Parties).

Vendor
Jvn
Product
Unknown
CVSS
MEDIUM 4.3
CISA KEV
Not listed in stored evidence
Original CVE published
2024-04-04
Original CVE updated
2026-05-12
Advisory published
2024-04-04
Advisory updated
2026-05-12

Who should care

Organizations and individuals using affected ELECOM wireless LAN routers, especially in environments where untrusted devices may be on the same local network segment or otherwise network-adjacent. Administrators responsible for router management, small-office/home-office networks, and support teams handling device configuration backups should pay attention.

Technical summary

The issue is an unauthenticated, network-adjacent information disclosure. The NVD vector is AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating that an attacker does not need credentials or user interaction, but must have adjacent network access. The reported impact is confidentiality-only: the attacker can retrieve a configuration file that may expose sensitive router data. No integrity or availability impact is indicated in the supplied corpus.

Defensive priority

Moderate. The CVSS score is 4.3 (MEDIUM), but the exposure of configuration data can still be operationally important because it may reveal sensitive settings or information useful for further compromise. Prioritize it for exposed or broadly reachable local networks.

Recommended defensive actions

  • Review ELECOM's security notice and JVN advisory for affected models and remediation guidance.
  • Apply any vendor-recommended firmware updates or mitigations for impacted routers.
  • Restrict network-adjacent access to management interfaces and device services where possible.
  • Audit whether router configuration backups or exported files contain sensitive credentials or secrets.
  • Rotate any credentials or secrets that may have been exposed if a device was reachable by untrusted local actors.
  • Monitor for unauthorized access to router configuration endpoints on affected devices.

Evidence notes

This debrief is based only on the supplied CVE record and official references. The source corpus states that ELECOM wireless LAN routers are affected, that a network-adjacent unauthenticated attacker can obtain a configuration file using a specially crafted request, and that the weakness is CWE-552. NVD metadata shows CVSS 3.1 AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N and vulnStatus Deferred. Published date used is 2024-04-04; modified date is 2026-05-12.

Official resources

Publicly disclosed on 2024-04-04 through official vulnerability reporting channels referenced in the supplied corpus.