All the vulnerabilites related to BUFFALO INC. - WEX-1166DHP2
jvndb-2024-000087
Vulnerability from jvndb
Published
2024-08-23 14:17
Modified
2024-08-23 14:17
Severity ?
Summary
BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection
Details
Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).
Yoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN12824024/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-44072 | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html", "dc:date": "2024-08-23T14:17+09:00", "dcterms:issued": "2024-08-23T14:17+09:00", "dcterms:modified": "2024-08-23T14:17+09:00", "description": "Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).\r\n\r\nYoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html", "sec:cpe": [ { "#text": "cpe:/h:buffalo_inc:whr-1166dhp", "@product": "WHR-1166DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-300hp2", "@product": "WHR-300HP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-600d", "@product": "WHR-600D", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wmr-300", "@product": "WMR-300", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wsr-600dhp", "@product": "WSR-600DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhp", "@product": "WEX-1166DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhp2", "@product": "WEX-1166DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhps", "@product": "WEX-1166DHPS", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300hps%2Fn", "@product": "WEX-300HPS/N", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300hptx%2Fn", "@product": "WEX-300HPTX/N", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhp", "@product": "WEX-733DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhp2", "@product": "WEX-733DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhps", "@product": "WEX-733DHPS", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhptx", "@product": "WEX-733DHPTX", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp2", "@product": "WHR-1166DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp3", "@product": "WHR-1166DHP3", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp4", "@product": "WHR-1166DHP4", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp3", "@product": "WSR-1166DHP3", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "7.2", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000087", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN12824024/index.html", "@id": "JVN#12824024", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-44072", "@id": "CVE-2024-44072", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection" }
cve-2024-44072
Vulnerability from cvelistv5
Published
2024-09-10 06:56
Modified
2024-09-10 19:58
Severity ?
EPSS score ?
Summary
OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | BUFFALO INC. | WHR-1166DHP2 |
Version: Ver. 2.95 and earlier |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp3", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp4:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp4", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wsr_1166dhp3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wsr_1166dhp3", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.18", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wsr_600dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wsr_600dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.93", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_300hptxn:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_300hptxn", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.03", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.05", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhps:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhps", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.05", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_300hpsn:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_300hpsn", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhps:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhps", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733hptx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733hptx", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.03", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.23", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.64", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.92", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_300hp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_300hp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.51", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_600d:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_600d", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.91", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wmr_300:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wmr_300", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.50", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-44072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T18:57:48.477370Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T19:58:39.140Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WHR-1166DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WHR-1166DHP3", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WHR-1166DHP4", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WSR-1166DHP3", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.18 and earlier" } ] }, { "product": "WSR-600DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.93 and earlier" } ] }, { "product": "WEX-300HPTX/N", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.03 and earlier" } ] }, { "product": "WEX-1166DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.05 and earlier" } ] }, { "product": "WEX-1166DHPS", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.05 and earlier" } ] }, { "product": "WEX-300HPS/N", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHPS", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHPTX", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.03 and earlier" } ] }, { "product": "WEX-1166DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.23 and earlier" } ] }, { "product": "WEX-733DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.64 and earlier" } ] }, { "product": "WHR-1166DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.92 and earlier" } ] }, { "product": "WHR-300HP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.51 and earlier" } ] }, { "product": "WHR-600D", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.91 and earlier" } ] }, { "product": "WMR-300", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.50 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product\u0027s specific management page, an arbitrary OS command may be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T06:56:44.182Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.buffalo.jp/news/detail/20240719-01.html" }, { "url": "https://jvn.jp/en/jp/JVN12824024/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-44072", "datePublished": "2024-09-10T06:56:44.182Z", "dateReserved": "2024-08-19T02:08:40.600Z", "dateUpdated": "2024-09-10T19:58:39.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }