All the vulnerabilites related to BUFFALO INC. - WSR-600DHP
jvndb-2015-000085
Vulnerability from jvndb
Published
2015-06-05 14:16
Modified
2015-06-10 17:54
Summary
Multiple Buffalo wireless LAN routers vulnerable to OS command injection
Details
Multiple wireless LAN routers provided by BUFFALO INC. contain an OS command injection vulnerability.
Masashi Sakai, Satoshi Ogawa reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000085.html", "dc:date": "2015-06-10T17:54+09:00", "dcterms:issued": "2015-06-05T14:16+09:00", "dcterms:modified": "2015-06-10T17:54+09:00", "description": "Multiple wireless LAN routers provided by BUFFALO INC. contain an OS command injection vulnerability.\r\n\r\nMasashi Sakai, Satoshi Ogawa reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000085.html", "sec:cpe": [ { "#text": "cpe:/h:buffalo_inc:bhr-4grv2", "@product": "BHR-4GRV2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wex-300", "@product": "WEX-300", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-1166dhp", "@product": "WHR-1166DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-300hp2", "@product": "WHR-300HP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-600d", "@product": "WHR-600D", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wmr-300", "@product": "WMR-300", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wsr-600dhp", "@product": "WSR-600DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "5.2", "@severity": "Medium", "@type": "Base", "@vector": "AV:A/AC:L/Au:S/C:P/I:P/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2015-000085", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN50447904/index.html", "@id": "JVN#50447904", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9284", "@id": "CVE-2014-9284", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9284", "@id": "CVE-2014-9284", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "Multiple Buffalo wireless LAN routers vulnerable to OS command injection" }
jvndb-2024-000087
Vulnerability from jvndb
Published
2024-08-23 14:17
Modified
2024-08-23 14:17
Severity ?
Summary
BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection
Details
Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).
Yoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN12824024/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2024-44072 | |
OS Command Injection(CWE-78) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html", "dc:date": "2024-08-23T14:17+09:00", "dcterms:issued": "2024-08-23T14:17+09:00", "dcterms:modified": "2024-08-23T14:17+09:00", "description": "Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).\r\n\r\nYoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-000087.html", "sec:cpe": [ { "#text": "cpe:/h:buffalo_inc:whr-1166dhp", "@product": "WHR-1166DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-300hp2", "@product": "WHR-300HP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:whr-600d", "@product": "WHR-600D", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wmr-300", "@product": "WMR-300", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/h:buffalo_inc:wsr-600dhp", "@product": "WSR-600DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhp", "@product": "WEX-1166DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhp2", "@product": "WEX-1166DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-1166dhps", "@product": "WEX-1166DHPS", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300hps%2Fn", "@product": "WEX-300HPS/N", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-300hptx%2Fn", "@product": "WEX-300HPTX/N", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhp", "@product": "WEX-733DHP", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhp2", "@product": "WEX-733DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhps", "@product": "WEX-733DHPS", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wex-733dhptx", "@product": "WEX-733DHPTX", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp2", "@product": "WHR-1166DHP2", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp3", "@product": "WHR-1166DHP3", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-1166dhp4", "@product": "WHR-1166DHP4", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wsr-1166dhp3", "@product": "WSR-1166DHP3", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "7.2", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2024-000087", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN12824024/index.html", "@id": "JVN#12824024", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2024-44072", "@id": "CVE-2024-44072", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)" } ], "title": "BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection" }
cve-2024-44072
Vulnerability from cvelistv5
Published
2024-09-10 06:56
Modified
2024-09-10 19:58
Severity ?
EPSS score ?
Summary
OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp3", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp4:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp4", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.95", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wsr_1166dhp3:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wsr_1166dhp3", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.18", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wsr_600dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wsr_600dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.93", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_300hptxn:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_300hptxn", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.03", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.05", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhps:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhps", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.05", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_300hpsn:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_300hpsn", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhps:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhps", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.02", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733hptx:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733hptx", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.03", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_1166dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_1166dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.23", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wex_733dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wex_733dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "1.64", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_1166dhp:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_1166dhp", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.92", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_300hp2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_300hp2", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.51", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:whr_600d:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "whr_600d", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.91", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:buffalo_inc:wmr_300:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wmr_300", "vendor": "buffalo_inc", "versions": [ { "lessThanOrEqual": "2.50", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-44072", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T18:57:48.477370Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T19:58:39.140Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WHR-1166DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WHR-1166DHP3", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WHR-1166DHP4", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.95 and earlier" } ] }, { "product": "WSR-1166DHP3", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.18 and earlier" } ] }, { "product": "WSR-600DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.93 and earlier" } ] }, { "product": "WEX-300HPTX/N", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.03 and earlier" } ] }, { "product": "WEX-1166DHP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.05 and earlier" } ] }, { "product": "WEX-1166DHPS", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.05 and earlier" } ] }, { "product": "WEX-300HPS/N", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHPS", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.02 and earlier" } ] }, { "product": "WEX-733DHPTX", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.03 and earlier" } ] }, { "product": "WEX-1166DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.23 and earlier" } ] }, { "product": "WEX-733DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 1.64 and earlier" } ] }, { "product": "WHR-1166DHP", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.92 and earlier" } ] }, { "product": "WHR-300HP2", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.51 and earlier" } ] }, { "product": "WHR-600D", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.91 and earlier" } ] }, { "product": "WMR-300", "vendor": "BUFFALO INC.", "versions": [ { "status": "affected", "version": "Ver. 2.50 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product\u0027s specific management page, an arbitrary OS command may be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "OS command injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T06:56:44.182Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.buffalo.jp/news/detail/20240719-01.html" }, { "url": "https://jvn.jp/en/jp/JVN12824024/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2024-44072", "datePublished": "2024-09-10T06:56:44.182Z", "dateReserved": "2024-08-19T02:08:40.600Z", "dateUpdated": "2024-09-10T19:58:39.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }