All the vulnerabilites related to BUFFALO INC. - WSR-1166DHP firmware
jvndb-2016-000006
Vulnerability from jvndb
Published
2016-01-22 14:36
Modified
2016-03-10 17:53
Severity ?
Summary
Multiple Buffalo network devices vulnerable to cross-site scripting
Details
Multiple network devices provided by BUFFALO INC. contain a cross-site scripting vulnerability.
Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000006.html", "dc:date": "2016-03-10T17:53+09:00", "dcterms:issued": "2016-01-22T14:36+09:00", "dcterms:modified": "2016-03-10T17:53+09:00", "description": "Multiple network devices provided by BUFFALO INC. contain a cross-site scripting vulnerability.\r\n\r\nSatoshi Ogawa of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000006.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:bhr-4grv2_firmware", "@product": "BHR-4GRV2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300_firmware", "@product": "WEX-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp_firmware", "@product": "WHR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-300hp2_firmware", "@product": "WHR-300HP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-600d_firmware", "@product": "WHR-600D firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wmr-300_firmware", "@product": "WMR-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wmr-433_firmware", "@product": "WMR-433 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware", "@product": "WSR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "6.1", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000006", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN49225722/index.html", "@id": "JVN#49225722", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1135", "@id": "CVE-2016-1135", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1135", "@id": "CVE-2016-1135", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Multiple Buffalo network devices vulnerable to cross-site scripting" }
jvndb-2016-000005
Vulnerability from jvndb
Published
2016-01-22 14:36
Modified
2016-03-10 17:53
Severity ?
Summary
Multiple Buffalo network devices vulnerable to cross-site request forgery
Details
Multiple network devices provided by BUFFALO INC. contain a cross-site request forgery vulnerability (CWE-352).
Satoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Masashi Sakai reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | http://jvn.jp/en/jp/JVN09268287/index.html | |
CVE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1134 | |
NVD | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1134 | |
Cross-Site Request Forgery(CWE-352) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000005.html", "dc:date": "2016-03-10T17:53+09:00", "dcterms:issued": "2016-01-22T14:36+09:00", "dcterms:modified": "2016-03-10T17:53+09:00", "description": "Multiple network devices provided by BUFFALO INC. contain a cross-site request forgery vulnerability (CWE-352).\r\n\r\nSatoshi Ogawa of Mitsui Bussan Secure Directions, Inc. and Masashi Sakai reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000005.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:bhr-4grv2_firmware", "@product": "BHR-4GRV2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300_firmware", "@product": "WEX-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp_firmware", "@product": "WHR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-300hp2_firmware", "@product": "WHR-300HP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-600d_firmware", "@product": "WHR-600D firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wmr-300_firmware", "@product": "WMR-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wmr-433_firmware", "@product": "WMR-433 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware", "@product": "WSR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "2.6", "@severity": "Low", "@type": "Base", "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000005", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN09268287/index.html", "@id": "JVN#09268287", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1134", "@id": "CVE-2016-1134", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1134", "@id": "CVE-2016-1134", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-352", "@title": "Cross-Site Request Forgery(CWE-352)" } ], "title": "Multiple Buffalo network devices vulnerable to cross-site request forgery" }
jvndb-2022-002775
Vulnerability from jvndb
Published
2022-12-12 15:28
Modified
2024-02-14 15:45
Severity ?
Summary
Multiple vulnerabilities in Buffalo network devices
Details
Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* OS Command Injection (CWE-78) - CVE-2022-43466
* OS Command Injection (CWE-78) - CVE-2022-43443
* Hidden Functionality (CWE-912) - CVE-2022-43486
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html", "dc:date": "2024-02-14T15:45+09:00", "dcterms:issued": "2022-12-12T15:28+09:00", "dcterms:modified": "2024-02-14T15:45+09:00", "description": "Multiple network devices provided by BUFFALO INC. contain multiple vulnerabilities listed below.\r\n\r\n * OS Command Injection (CWE-78) - CVE-2022-43466\r\n * OS Command Injection (CWE-78) - CVE-2022-43443\r\n * Hidden Functionality (CWE-912) - CVE-2022-43486\r\n\r\nChuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002775.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware", "@product": "WCR-1166DS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware", "@product": "WCR-1166DS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1800ax4ea_firmware", "@product": "WEX-1800AX4EA firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1800ax4_firmware", "@product": "WEX-1800AX4 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp2_firmware", "@product": "WSR-1166DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware", "@product": "WSR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhp2_firmware", "@product": "WSR-2533DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhp3-bk_firmware", "@product": "WSR-2533DHP3-BK firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhpl2-bk_firmware", "@product": "WSR-2533DHPL2-BK firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhplb_firmware", "@product": "WSR-2533DHPLB firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhpls_firmware", "@product": "WSR-2533DHPLS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhpl_firmware", "@product": "WSR-2533DHPL firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhp_firmware", "@product": "WSR-2533DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-3200ax4b_firmware", "@product": "WSR-3200AX4B firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-3200ax4s_firmware", "@product": "WSR-3200AX4S firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware", "@product": "WSR-A2533DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-a2533dhp3_firmware", "@product": "WSR-A2533DHP3 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-11000xe12_firmware", "@product": "WXR-11000XE12 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-5700ax7b_firmware", "@product": "WXR-5700AX7B firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-5700ax7s_firmware", "@product": "WXR-5700AX7S firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2022-002775", "sec:references": [ { "#text": "http://jvn.jp/en/vu/JVNVU97099584/index.html", "@id": "JVNVU#97099584", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43466", "@id": "CVE-2022-43466", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43443", "@id": "CVE-2022-43443", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43486", "@id": "CVE-2022-43486", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43443", "@id": "CVE-2022-43443", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43466", "@id": "CVE-2022-43466", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43486", "@id": "CVE-2022-43486", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" }, { "#text": "https://cwe.mitre.org/data/definitions/912.html", "@id": "CWE-912", "@title": "Hidden Functionality(CWE-912)" } ], "title": "Multiple vulnerabilities in Buffalo network devices" }
jvndb-2024-000040
Vulnerability from jvndb
Published
2024-04-15 16:29
Modified
2024-04-15 16:29
Severity ?
Summary
Multiple vulnerabilities in BUFFALO wireless LAN routers
Details
Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below.
* Plaintext storage of a password (CWE-256)
* OS Command Injection (CWE-78)
Satoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN58236836/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-23486 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-26023 | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html | |
No Mapping(CWE-Other) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html", "dc:date": "2024-04-15T16:29+09:00", "dcterms:issued": "2024-04-15T16:29+09:00", "dcterms:modified": "2024-04-15T16:29+09:00", "description": "Multiple wireless LAN routers provided by BUFFALO INC. contain multiple vulnerabilities listed below.\r\n\r\n * Plaintext storage of a password (CWE-256)\r\n * OS Command Injection (CWE-78)\r\n\r\nSatoru Nagaoka of Cyber Defense Institute, Inc. reported these vulnerabilities to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000040.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:wcr-1166ds_firmware", "@product": "WCR-1166DS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp2_firmware", "@product": "WSR-1166DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp_firmware", "@product": "WSR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhp2_firmware", "@product": "WSR-2533DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhpl_firmware", "@product": "WSR-2533DHPL firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-2533dhp_firmware", "@product": "WSR-2533DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-a2533dhp2_firmware", "@product": "WSR-A2533DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "6.8", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000040", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN58236836/index.html", "@id": "JVN#58236836", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-23486", "@id": "CVE-2024-23486", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-26023", "@id": "CVE-2024-26023", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-Other", "@title": "No Mapping(CWE-Other)" } ], "title": "Multiple vulnerabilities in BUFFALO wireless LAN routers" }