fkie_cve-2021-20716
Vulnerability from fkie_nvd
Published
2021-04-28 01:15
Modified
2024-11-21 05:47
Severity ?
Summary
Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.
Impacted products
Vendor Product Version
buffalo bhr-4rv_firmware *
buffalo bhr-4rv -
buffalo fs-g54_firmware *
buffalo fs-g54 -
buffalo wbr2-b11_firmware *
buffalo wbr2-b11 -
buffalo wbr2-g54_firmware *
buffalo wbr2-g54 -
buffalo wbr2-g54-kd_firmware *
buffalo wbr2-g54-kd -
buffalo wbr-b11_firmware *
buffalo wbr-b11 -
buffalo wbr-g54_firmware *
buffalo wbr-g54 -
buffalo wbr-g54l_firmware *
buffalo wbr-g54l -
buffalo whr2-a54g54_firmware *
buffalo whr2-a54g54 -
buffalo whr2-g54_firmware *
buffalo whr2-g54 -
buffalo whr2-g54v_firmware *
buffalo whr2-g54v -
buffalo whr3-ag54_firmware *
buffalo whr3-ag54 -
buffalo whr-g54_firmware *
buffalo whr-g54 -
buffalo whr-g54-nf_firmware *
buffalo whr-g54-nf -
buffalo wla2-g54_firmware *
buffalo wla2-g54 -
buffalo wla2-g54c_firmware *
buffalo wla2-g54c -
buffalo wla-b11_firmware *
buffalo wla-b11 -
buffalo wla-g54_firmware *
buffalo wla-g54 -
buffalo wla-g54c_firmware *
buffalo wla-g54c -
buffalo wlah-a54g54_firmware *
buffalo wlah-a54g54 -
buffalo wlah-am54g54_firmware *
buffalo wlah-am54g54 -
buffalo wlah-g54_firmware *
buffalo wlah-g54 -
buffalo wli2-tx1-ag54_firmware *
buffalo wli2-tx1-ag54 -
buffalo wli2-tx1-amg54_firmware *
buffalo wli2-tx1-amg54 -
buffalo wli2-tx1-g54_firmware *
buffalo wli2-tx1-g54 -
buffalo wli3-tx1-amg54_firmware *
buffalo wli3-tx1-amg54 -
buffalo wli3-tx1-g54_firmware *
buffalo wli3-tx1-g54 -
buffalo wli-t1-b11_firmware *
buffalo wli-t1-b11 -
buffalo wli-tx1-g54_firmware *
buffalo wli-tx1-g54 -
buffalo wvr-g54-nf_firmware *
buffalo wvr-g54-nf -
buffalo wzr-g108_firmware *
buffalo wzr-g108 -
buffalo wzr-g54_firmware *
buffalo wzr-g54 -
buffalo wzr-hp-g54_firmware *
buffalo wzr-hp-g54 -
buffalo wzr-rs-g54_firmware *
buffalo wzr-rs-g54 -
buffalo wzr-rs-g54hp_firmware *
buffalo wzr-rs-g54hp -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5870F64-5EE0-425F-B71E-DDE20BCDFD0F",
              "versionEndIncluding": "2.55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A0BAD48-7DB1-4F5C-8503-D86397814FAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DD66E3-90E8-4567-883A-04CE9412A80E",
              "versionEndIncluding": "2.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38861F63-A04A-4EF0-B3E8-D4EA979EE1AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9D050ED-860A-4154-8402-8A6214C5D9AE",
              "versionEndIncluding": "2.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF5EEF7B-42BC-4755-98F6-CFA2FAD956B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DD735D-16B3-424A-ADF9-48B4FD2923AB",
              "versionEndIncluding": "2.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "126F7265-9B71-44E5-8C9D-7187A9A615E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99B403F-8E68-4A1B-86F9-CEB0C89F3BDA",
              "versionEndIncluding": "2.32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E26714-316A-493C-A87E-9045EC964C24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB556A4-0E37-48EA-8A41-94916F84A6D0",
              "versionEndIncluding": "2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7F11A5-614F-4DC2-A6F4-F50929B35CB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E3DE3C-C479-44EC-98FE-C6651344ADF2",
              "versionEndIncluding": "2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC28158A-3AC9-4845-B3FC-DA0D15F1A234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3CD564-DF11-4BCE-AE47-F492B1E34D47",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE55F75-F79C-43D2-B0EC-0606E09BEBA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59ECCE87-35AE-4DE4-A64D-7266EA2C1DF2",
              "versionEndIncluding": "2.25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9C7FD1B-522F-4F5F-B70D-7974629CECD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8971EBC0-38A9-4ADD-BF54-377711B7A202",
              "versionEndIncluding": "2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "424D75EE-6A08-4BAE-ABA2-3AA0CB66AE09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AC2B3D-1AC2-4A4B-8574-0281BE8D0112",
              "versionEndIncluding": "2.55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC638B4-5AA5-4FB7-BF81-93284B4C383D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "243CA979-35B8-480B-88B1-D2396C2B1EBB",
              "versionEndIncluding": "2.23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A9D554A-7834-4F8F-B09A-60B07BA68183",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27DCC1-4BAA-4FDB-981C-620FB673DCFD",
              "versionEndIncluding": "2.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6CE343-E4AA-4193-8F14-3D3636336C39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1CDF075-F252-420A-8D95-665B459286A3",
              "versionEndIncluding": "2.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5666A7B5-F61D-407F-92EB-BF617494FAAD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4F8B41F-6323-4A4F-8C04-778E9C9E353A",
              "versionEndIncluding": "2.24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C10BFB1-5279-4B83-B718-C2DDA278EE39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D55ABAA-1134-44BA-96C4-94D342D80925",
              "versionEndIncluding": "2.24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4D1EDA2-5FFC-4BEF-8896-47C9B321A9EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4F145F-F986-43E5-B673-3960E4036ACC",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98B6936-7028-493E-8172-F0B37814E50D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D3D3A5-C320-4B64-A229-FE2C5456D13C",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D2A48F-F9A2-493D-9BB3-E9532D23CE94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA1CA814-9908-42F4-A8AD-A7DED8A64D96",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BFF863A-47DE-4DA4-94A7-35C500C6EDE8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70B3D38-C263-42DA-9132-2C655F1006D0",
              "versionEndIncluding": "2.54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27242BE1-FE1D-4375-8B58-25ED9C72D5CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2A4EF-E2D7-482B-B8F9-078458A32E46",
              "versionEndIncluding": "2.54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAA95E36-C07F-49A5-8249-175A0A58988E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B1FDE14-9E3D-4471-AB45-32DB47320776",
              "versionEndIncluding": "2.54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E976B4-E92C-4D89-9451-D7D1F71E341B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C16CD8-DA3C-40E5-82E3-E642179E8B00",
              "versionEndIncluding": "2.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43B4520B-6782-4C95-B042-9190A972133C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B74E01-FFA3-431A-B5EB-BB17861906C3",
              "versionEndIncluding": "2.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A94087-2F4D-4839-BB49-87EDF2B46E45",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D7C0BC-E88A-457D-B741-2E27C32F1137",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A94806-CC4D-490D-B219-4A4DCEF19FC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A426BB-E1D2-4C9D-9E44-CC4DCC162DF2",
              "versionEndIncluding": "2.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F5259C-9D25-43F8-B83C-6484C21589FD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5162DD-0A9B-4C57-8AAD-424EF1AB1EBD",
              "versionEndIncluding": "2.53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68182904-2100-4AEF-B155-26C76E4A95AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C23ADB3-DAFC-4039-9C82-29FC1A30158C",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC65A05-7452-488B-984C-D5FF8F675806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2000A0E-9E6C-4804-BA57-3AD4223D0933",
              "versionEndIncluding": "2.20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "719095B6-A2D4-44F5-B38D-ADEB4DB16DEC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15611D1-3D46-4824-B3A7-D61475D4D39B",
              "versionEndIncluding": "2.02",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "086A819B-D0FE-4689-8647-3A0C128ABAE8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9AE0C2-2D7E-4C91-9212-18696307E6A0",
              "versionEndIncluding": "2.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4286D1A-0E67-44BC-9E2C-19118CA9D7D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F026AD1-4117-44DE-BE84-6DE9EE65A290",
              "versionEndIncluding": "2.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "220B227C-AEF5-403D-83E5-FC739168E0EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E907479-F6A4-40D5-A859-4ED7421BC93A",
              "versionEndIncluding": "2.41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49734A6A-1CD2-4866-8A43-5D31E319C1A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4AAB693-433F-4952-9A76-A44FAC2D7D9D",
              "versionEndIncluding": "2.55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86E1F62B-EF45-4945-A2A8-5FC6576FEB5A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B827DA8E-11E7-46E0-8B87-707D82F2BB55",
              "versionEndIncluding": "2.55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3576314-AF31-4C42-A526-507F86DCF59D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
    },
    {
      "lang": "es",
      "value": "Una funcionalidad Hidden en m\u00faltiples dispositivos de red de Buffalo (firmware de BHR-4RV Ver.2.55 y anteriores, firmware de FS-G54 Ver.2.04 y anteriores, firmware de WBR2-B11 Ver.2.32 y anteriores, firmware de WBR2-G54 Ver.2 .32 y anteriores, firmware de WBR2-G54-KD Ver.2.32 y anteriores, firmware de WBR-B11 Ver.2.23 y anteriores, firmware de WBR-G54 Ver.2.23 y anteriores, firmware de WBR-G54L Ver.2.20 y anteriores, firmware de WHR2-A54G54 Ver.2 .25 y anteriores, firmware de WHR2-G54 Ver.2.23 y anteriores, firmware de WHR2-G54V Ver.2.55 y anteriores, firmware de WHR3-AG54 Ver.2.23 y anteriores, firmware de WHR-G54 Ver.2.16 y anteriores, firmware de WHR-G54-NF Ver.2 .10 y anteriores, firmware de WLA2-G54 Ver.2.24 y anteriores, firmware de WLA2-G54C Ver.2.24 y anteriores, firmware de WLA-B11 Ver.2.20 y anteriores, firmware de WLA-G54 Ver.2.20 y anteriores, firmware de WLA-G54C Ver.2.20 y anteriores, firmware de WLAH-A54G54 Ver.2 .54 y anteriores, firmware de WLAH-AM54G54 Ver.2.54 y anteriores, firmware de WLAH-G54 Ver.2.54 y anteriores, firmware de WLI2-TX1-AG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-G54 Ver.2 .20 y anteriores, firmware de WLI3-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI3-TX1-G54 Ver.2.53 y anteriores, firmware de WLI-T1-B11 Ver.2.20 y anteriores, firmware de WLI-TX1-G54 Ver.2.20 y anteriores, firmware de WVR-G54-NF Ver.2 .02 y anteriores, firmware de WZR-G108 Ver.2.41 y anteriores, firmware de WZR-G54 Ver.2.41 y anteriores, firmware de WZR-HP-G54 Ver.2.41 y anteriores, firmware de WZR-RS-G54 Ver.2.55 y anteriores, y firmware de WZR-RS-G54HP Ver.2.55 y anteriores) permite a un atacante remoto habilitar la opci\u00f3n de depuraci\u00f3n y ejecutar c\u00f3digo arbitrario o comandos del Sistema Operativo, cambiar la configuraci\u00f3n, y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)"
    }
  ],
  "id": "CVE-2021-20716",
  "lastModified": "2024-11-21T05:47:03.950",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-04-28T01:15:17.107",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.buffalo.jp/news/detail/20210427-02.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.buffalo.jp/news/detail/20210427-02.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…