Refine your search
4 vulnerabilities found for WSR-1166DHP firmware by BUFFALO INC.
jvndb-2024-000040
Vulnerability from jvndb
Published
2024-04-15 16:29
Modified
2024-04-15 16:29
Severity ?
Summary
Multiple vulnerabilities in BUFFALO wireless LAN routers
Details
Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* Plaintext storage of a password (CWE-256)
* OS Command Injection (CWE-78)
Satoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html",
"dc:date": "2024-04-15T16:29+09:00",
"dcterms:issued": "2024-04-15T16:29+09:00",
"dcterms:modified": "2024-04-15T16:29+09:00",
"description": "Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below.\r\n\r\n * Plaintext storage of a password (CWE-256)\r\n * OS Command Injection (CWE-78)\r\n\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html",
"sec:cpe": [
{
"#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware",
"@product": "WCR-1166DS firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp2_firmware",
"@product": "WSR-1166DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware",
"@product": "WSR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhp2_firmware",
"@product": "WSR-2533DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhpl_firmware",
"@product": "WSR-2533DHPL firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhp_firmware",
"@product": "WSR-2533DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware",
"@product": "WSR-A2533DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2024-000040",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN58236836/index.html",
"@id": "JVN#58236836",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-23486",
"@id": "CVE-2024-23486",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-26023",
"@id": "CVE-2024-26023",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "Multiple vulnerabilities in BUFFALO wireless LAN routers"
}
jvndb-2022-002775
Vulnerability from jvndb
Published
2022-12-12 15:28
Modified
2024-02-14 15:45
Severity ?
Summary
Multiple vulnerabilities in Buffalo network devices
Details
Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2022-43466
* OS Command Injection (CWE-78) - CVE-2022-43443
* Hidden Functionality (CWE-912) - CVE-2022-43486
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
Impacted products
| Vendor | Product | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html",
"dc:date": "2024-02-14T15:45+09:00",
"dcterms:issued": "2022-12-12T15:28+09:00",
"dcterms:modified": "2024-02-14T15:45+09:00",
"description": "Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.\r\n\r\n * OS Command Injection (CWE-78) - CVE-2022-43466\r\n * OS Command Injection (CWE-78) - CVE-2022-43443\r\n * Hidden Functionality (CWE-912) - CVE-2022-43486\r\n\r\nChuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.",
"link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html",
"sec:cpe": [
{
"#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware",
"@product": "WCR-1166DS firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware",
"@product": "WCR-1166DS firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wex-1800ax4ea_firmware",
"@product": "WEX-1800AX4EA firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wex-1800ax4_firmware",
"@product": "WEX-1800AX4 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp2_firmware",
"@product": "WSR-1166DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware",
"@product": "WSR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhp2_firmware",
"@product": "WSR-2533DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhp3-bk_firmware",
"@product": "WSR-2533DHP3-BK firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhpl2-bk_firmware",
"@product": "WSR-2533DHPL2-BK firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhplb_firmware",
"@product": "WSR-2533DHPLB firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhpls_firmware",
"@product": "WSR-2533DHPLS firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhpl_firmware",
"@product": "WSR-2533DHPL firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-2533dhp_firmware",
"@product": "WSR-2533DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-3200ax4b_firmware",
"@product": "WSR-3200AX4B firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-3200ax4s_firmware",
"@product": "WSR-3200AX4S firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware",
"@product": "WSR-A2533DHP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-a2533dhp3_firmware",
"@product": "WSR-A2533DHP3 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wxr-11000xe12_firmware",
"@product": "WXR-11000XE12 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wxr-5700ax7b_firmware",
"@product": "WXR-5700AX7B firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wxr-5700ax7s_firmware",
"@product": "WXR-5700AX7S firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "6.8",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"@version": "3.0"
},
"sec:identifier": "JVNDB-2022-002775",
"sec:references": [
{
"#text": "http://jvn.jp/en/vu/JVNVU97099584/index.html",
"@id": "JVNVU#97099584",
"@source": "JVN"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2022-43466",
"@id": "CVE-2022-43466",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2022-43443",
"@id": "CVE-2022-43443",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2022-43486",
"@id": "CVE-2022-43486",
"@source": "CVE"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43443",
"@id": "CVE-2022-43443",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43466",
"@id": "CVE-2022-43466",
"@source": "NVD"
},
{
"#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43486",
"@id": "CVE-2022-43486",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
},
{
"#text": "https://cwe.mitre.org/data/definitions/912.html",
"@id": "CWE-912",
"@title": "Hidden Functionality(CWE-912)"
}
],
"title": "Multiple vulnerabilities in Buffalo network devices"
}
jvndb-2016-000006
Vulnerability from jvndb
Published
2016-01-22 14:36
Modified
2016-03-10 17:53
Severity ?
Summary
Multiple Buffalo network devices vulnerable to cross-site scripting
Details
Multiple network devices provided by BUFFALO INC. contain a cross-site scripting vulnerability.
Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000006.html",
"dc:date": "2016-03-10T17:53+09:00",
"dcterms:issued": "2016-01-22T14:36+09:00",
"dcterms:modified": "2016-03-10T17:53+09:00",
"description": "Multiple network devices provided by BUFFALO INC. contain a cross-site scripting vulnerability.\r\n\r\nSatoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000006.html",
"sec:cpe": [
{
"#text": "cpe:/o:buffalo_inc:bhr-4grv2_firmware",
"@product": "BHR-4GRV2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wex-300_firmware",
"@product": "WEX-300 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-1166dhp_firmware",
"@product": "WHR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-300hp2_firmware",
"@product": "WHR-300HP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-600d_firmware",
"@product": "WHR-600D firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wmr-300_firmware",
"@product": "WMR-300 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wmr-433_firmware",
"@product": "WMR-433 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware",
"@product": "WSR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "6.1",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000006",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN49225722/index.html",
"@id": "JVN#49225722",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1135",
"@id": "CVE-2016-1135",
"@source": "CVE"
},
{
"#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1135",
"@id": "CVE-2016-1135",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-79",
"@title": "Cross-site Scripting(CWE-79)"
}
],
"title": "Multiple Buffalo network devices vulnerable to cross-site scripting"
}
jvndb-2016-000005
Vulnerability from jvndb
Published
2016-01-22 14:36
Modified
2016-03-10 17:53
Severity ?
Summary
Multiple Buffalo network devices vulnerable to cross-site request forgery
Details
Multiple network devices provided by BUFFALO INC. contain a cross-site request forgery vulnerability (CWE-352).
Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000005.html",
"dc:date": "2016-03-10T17:53+09:00",
"dcterms:issued": "2016-01-22T14:36+09:00",
"dcterms:modified": "2016-03-10T17:53+09:00",
"description": "Multiple network devices provided by BUFFALO INC. contain a cross-site request forgery vulnerability (CWE-352).\r\n\r\nSatoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Masashi Sakai reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000005.html",
"sec:cpe": [
{
"#text": "cpe:/o:buffalo_inc:bhr-4grv2_firmware",
"@product": "BHR-4GRV2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wex-300_firmware",
"@product": "WEX-300 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-1166dhp_firmware",
"@product": "WHR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-300hp2_firmware",
"@product": "WHR-300HP2 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:whr-600d_firmware",
"@product": "WHR-600D firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wmr-300_firmware",
"@product": "WMR-300 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wmr-433_firmware",
"@product": "WMR-433 firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
},
{
"#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware",
"@product": "WSR-1166DHP firmware",
"@vendor": "BUFFALO INC.",
"@version": "2.2"
}
],
"sec:cvss": [
{
"@score": "2.6",
"@severity": "Low",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"@version": "2.0"
},
{
"@score": "4.3",
"@severity": "Medium",
"@type": "Base",
"@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"@version": "3.0"
}
],
"sec:identifier": "JVNDB-2016-000005",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN09268287/index.html",
"@id": "JVN#09268287",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1134",
"@id": "CVE-2016-1134",
"@source": "CVE"
},
{
"#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1134",
"@id": "CVE-2016-1134",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-352",
"@title": "Cross-Site Request Forgery(CWE-352)"
}
],
"title": "Multiple Buffalo network devices vulnerable to cross-site request forgery"
}