Publication Date: March 25, 2026
Security Vulnerability in Our Router Products
Thank you for using our products. It has been discovered that certain our router contains a security vulnerability and please update them. Please refer to the table below for an overview of the vulnerability and the affected products. We apologize for any inconvenience this issue may cause to our customers.
| Affected models and firmware version |
For NTT DOCOMO, INC.
For SoftBank Corp.
For KDDI CORPORATION
|
|---|---|
| Vulnerability Description |
Our routers do not perform authentication for some web APIs.Those web APIs provide device information, and the initial administrative password is based on a part of the device information. CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 6.9 CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Base Score 5.7 CVE: CVE-2026-32326 CWE: Missing Authentication for Critical Function (CWE-306) |
| Possible impacts |
The device information may be retrieved without authentication. If the administrative password of the device is left as the initial one, the device may be vulnerable to unauthorized access. |
| Countermeasure |
We have released updated software that addresses this vulnerability. Please refer to the website for each product and perform a software update. For routers with automatic software update enabled, the update may have already been applied. Please note that support for the following products has already ended. For these products, please apply the mitigation measures described below. End-of-Service Products
|
| Mitigation measures |
Please use a PC, smartphone, or other mobile device, access the router’s Settings Tool via a web browser and change the default password. Please refer to the user manual for details on how to connect to the router. |
| References |
As detailed information, please refer to the relevant product support pages. Please note that pages may be written in Japanese. For NTT DOCOMO, INC.
For SoftBank Corp.
The CVE ID is provided in the "Vulnerability Description" section above.
JVN#49524110: SHARP routers missing authentication for some web APIs
https://jvn.jp/en/jp/JVN49524110/ |
| Acknowledgment |
This vulnerability was discovered through a report from Shota Zaizen, coordinated via JPCERT/CC. |
| Revision History |
March 25, 2026: Initial release of this vulnerability information. |