CVE-2021-20716 (GCVE-0-2021-20716)

Vulnerability from cvelistv5 – Published: 2021-04-28 00:45 – Updated: 2024-08-03 17:53
VLAI?
Summary
Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.
Severity ?
No CVSS data available.
CWE
  • Hidden Functionality
Assigner
Impacted products
Vendor Product Version
BUFFALO INC. Buffalo network devices Affected: BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 ...[truncated*]
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:21.257Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.buffalo.jp/news/detail/20210427-02.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Buffalo network devices",
          "vendor": "BUFFALO INC.",
          "versions": [
            {
              "status": "affected",
              "version": "BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53  ...[truncated*]"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Hidden Functionality",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-04-28T00:45:25",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.buffalo.jp/news/detail/20210427-02.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
        }
      ],
      "x_ConverterErrors": {
        "version_name": {
          "error": "version_name too long. Use array of versions to record more than one version.",
          "message": "Truncated!"
        }
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2021-20716",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Buffalo network devices",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "BUFFALO INC."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Hidden Functionality"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.buffalo.jp/news/detail/20210427-02.html",
              "refsource": "MISC",
              "url": "https://www.buffalo.jp/news/detail/20210427-02.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU90274525/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2021-20716",
    "datePublished": "2021-04-28T00:45:25",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-08-03T17:53:21.257Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"A5870F64-5EE0-425F-B71E-DDE20BCDFD0F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A0BAD48-7DB1-4F5C-8503-D86397814FAA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.04\", \"matchCriteriaId\": \"74DD66E3-90E8-4567-883A-04CE9412A80E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38861F63-A04A-4EF0-B3E8-D4EA979EE1AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"A9D050ED-860A-4154-8402-8A6214C5D9AE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF5EEF7B-42BC-4755-98F6-CFA2FAD956B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"21DD735D-16B3-424A-ADF9-48B4FD2923AB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"126F7265-9B71-44E5-8C9D-7187A9A615E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"D99B403F-8E68-4A1B-86F9-CEB0C89F3BDA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18E26714-316A-493C-A87E-9045EC964C24\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"8CB556A4-0E37-48EA-8A41-94916F84A6D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD7F11A5-614F-4DC2-A6F4-F50929B35CB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"F1E3DE3C-C479-44EC-98FE-C6651344ADF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC28158A-3AC9-4845-B3FC-DA0D15F1A234\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"2E3CD564-DF11-4BCE-AE47-F492B1E34D47\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE55F75-F79C-43D2-B0EC-0606E09BEBA6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.25\", \"matchCriteriaId\": \"59ECCE87-35AE-4DE4-A64D-7266EA2C1DF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9C7FD1B-522F-4F5F-B70D-7974629CECD2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"8971EBC0-38A9-4ADD-BF54-377711B7A202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424D75EE-6A08-4BAE-ABA2-3AA0CB66AE09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"53AC2B3D-1AC2-4A4B-8574-0281BE8D0112\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAC638B4-5AA5-4FB7-BF81-93284B4C383D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"243CA979-35B8-480B-88B1-D2396C2B1EBB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A9D554A-7834-4F8F-B09A-60B07BA68183\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.16\", \"matchCriteriaId\": \"8C27DCC1-4BAA-4FDB-981C-620FB673DCFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E6CE343-E4AA-4193-8F14-3D3636336C39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.10\", \"matchCriteriaId\": \"B1CDF075-F252-420A-8D95-665B459286A3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5666A7B5-F61D-407F-92EB-BF617494FAAD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.24\", \"matchCriteriaId\": \"A4F8B41F-6323-4A4F-8C04-778E9C9E353A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C10BFB1-5279-4B83-B718-C2DDA278EE39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.24\", \"matchCriteriaId\": \"6D55ABAA-1134-44BA-96C4-94D342D80925\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4D1EDA2-5FFC-4BEF-8896-47C9B321A9EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"DB4F145F-F986-43E5-B673-3960E4036ACC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E98B6936-7028-493E-8172-F0B37814E50D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"41D3D3A5-C320-4B64-A229-FE2C5456D13C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2D2A48F-F9A2-493D-9BB3-E9532D23CE94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"AA1CA814-9908-42F4-A8AD-A7DED8A64D96\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BFF863A-47DE-4DA4-94A7-35C500C6EDE8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"F70B3D38-C263-42DA-9132-2C655F1006D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27242BE1-FE1D-4375-8B58-25ED9C72D5CF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"A7D2A4EF-E2D7-482B-B8F9-078458A32E46\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAA95E36-C07F-49A5-8249-175A0A58988E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"5B1FDE14-9E3D-4471-AB45-32DB47320776\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1E976B4-E92C-4D89-9451-D7D1F71E341B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"95C16CD8-DA3C-40E5-82E3-E642179E8B00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43B4520B-6782-4C95-B042-9190A972133C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"86B74E01-FFA3-431A-B5EB-BB17861906C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06A94087-2F4D-4839-BB49-87EDF2B46E45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"56D7C0BC-E88A-457D-B741-2E27C32F1137\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71A94806-CC4D-490D-B219-4A4DCEF19FC7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"26A426BB-E1D2-4C9D-9E44-CC4DCC162DF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F5259C-9D25-43F8-B83C-6484C21589FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"AB5162DD-0A9B-4C57-8AAD-424EF1AB1EBD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68182904-2100-4AEF-B155-26C76E4A95AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"2C23ADB3-DAFC-4039-9C82-29FC1A30158C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC65A05-7452-488B-984C-D5FF8F675806\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"D2000A0E-9E6C-4804-BA57-3AD4223D0933\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"719095B6-A2D4-44F5-B38D-ADEB4DB16DEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.02\", \"matchCriteriaId\": \"F15611D1-3D46-4824-B3A7-D61475D4D39B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"086A819B-D0FE-4689-8647-3A0C128ABAE8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"5F9AE0C2-2D7E-4C91-9212-18696307E6A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4286D1A-0E67-44BC-9E2C-19118CA9D7D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"2F026AD1-4117-44DE-BE84-6DE9EE65A290\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"220B227C-AEF5-403D-83E5-FC739168E0EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"6E907479-F6A4-40D5-A859-4ED7421BC93A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49734A6A-1CD2-4866-8A43-5D31E319C1A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"D4AAB693-433F-4952-9A76-A44FAC2D7D9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E1F62B-EF45-4945-A2A8-5FC6576FEB5A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"B827DA8E-11E7-46E0-8B87-707D82F2BB55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3576314-AF31-4C42-A526-507F86DCF59D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.\"}, {\"lang\": \"es\", \"value\": \"Una funcionalidad Hidden en m\\u00faltiples dispositivos de red de Buffalo (firmware de BHR-4RV Ver.2.55 y anteriores, firmware de FS-G54 Ver.2.04 y anteriores, firmware de WBR2-B11 Ver.2.32 y anteriores, firmware de WBR2-G54 Ver.2 .32 y anteriores, firmware de WBR2-G54-KD Ver.2.32 y anteriores, firmware de WBR-B11 Ver.2.23 y anteriores, firmware de WBR-G54 Ver.2.23 y anteriores, firmware de WBR-G54L Ver.2.20 y anteriores, firmware de WHR2-A54G54 Ver.2 .25 y anteriores, firmware de WHR2-G54 Ver.2.23 y anteriores, firmware de WHR2-G54V Ver.2.55 y anteriores, firmware de WHR3-AG54 Ver.2.23 y anteriores, firmware de WHR-G54 Ver.2.16 y anteriores, firmware de WHR-G54-NF Ver.2 .10 y anteriores, firmware de WLA2-G54 Ver.2.24 y anteriores, firmware de WLA2-G54C Ver.2.24 y anteriores, firmware de WLA-B11 Ver.2.20 y anteriores, firmware de WLA-G54 Ver.2.20 y anteriores, firmware de WLA-G54C Ver.2.20 y anteriores, firmware de WLAH-A54G54 Ver.2 .54 y anteriores, firmware de WLAH-AM54G54 Ver.2.54 y anteriores, firmware de WLAH-G54 Ver.2.54 y anteriores, firmware de WLI2-TX1-AG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-G54 Ver.2 .20 y anteriores, firmware de WLI3-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI3-TX1-G54 Ver.2.53 y anteriores, firmware de WLI-T1-B11 Ver.2.20 y anteriores, firmware de WLI-TX1-G54 Ver.2.20 y anteriores, firmware de WVR-G54-NF Ver.2 .02 y anteriores, firmware de WZR-G108 Ver.2.41 y anteriores, firmware de WZR-G54 Ver.2.41 y anteriores, firmware de WZR-HP-G54 Ver.2.41 y anteriores, firmware de WZR-RS-G54 Ver.2.55 y anteriores, y firmware de WZR-RS-G54HP Ver.2.55 y anteriores) permite a un atacante remoto habilitar la opci\\u00f3n de depuraci\\u00f3n y ejecutar c\\u00f3digo arbitrario o comandos del Sistema Operativo, cambiar la configuraci\\u00f3n, y causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS)\"}]",
      "id": "CVE-2021-20716",
      "lastModified": "2024-11-21T05:47:03.950",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-04-28T01:15:17.107",
      "references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU90274525/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.buffalo.jp/news/detail/20210427-02.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU90274525/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.buffalo.jp/news/detail/20210427-02.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-20716\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2021-04-28T01:15:17.107\",\"lastModified\":\"2024-11-21T05:47:03.950\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.\"},{\"lang\":\"es\",\"value\":\"Una funcionalidad Hidden en m\u00faltiples dispositivos de red de Buffalo (firmware de BHR-4RV Ver.2.55 y anteriores, firmware de FS-G54 Ver.2.04 y anteriores, firmware de WBR2-B11 Ver.2.32 y anteriores, firmware de WBR2-G54 Ver.2 .32 y anteriores, firmware de WBR2-G54-KD Ver.2.32 y anteriores, firmware de WBR-B11 Ver.2.23 y anteriores, firmware de WBR-G54 Ver.2.23 y anteriores, firmware de WBR-G54L Ver.2.20 y anteriores, firmware de WHR2-A54G54 Ver.2 .25 y anteriores, firmware de WHR2-G54 Ver.2.23 y anteriores, firmware de WHR2-G54V Ver.2.55 y anteriores, firmware de WHR3-AG54 Ver.2.23 y anteriores, firmware de WHR-G54 Ver.2.16 y anteriores, firmware de WHR-G54-NF Ver.2 .10 y anteriores, firmware de WLA2-G54 Ver.2.24 y anteriores, firmware de WLA2-G54C Ver.2.24 y anteriores, firmware de WLA-B11 Ver.2.20 y anteriores, firmware de WLA-G54 Ver.2.20 y anteriores, firmware de WLA-G54C Ver.2.20 y anteriores, firmware de WLAH-A54G54 Ver.2 .54 y anteriores, firmware de WLAH-AM54G54 Ver.2.54 y anteriores, firmware de WLAH-G54 Ver.2.54 y anteriores, firmware de WLI2-TX1-AG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-G54 Ver.2 .20 y anteriores, firmware de WLI3-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI3-TX1-G54 Ver.2.53 y anteriores, firmware de WLI-T1-B11 Ver.2.20 y anteriores, firmware de WLI-TX1-G54 Ver.2.20 y anteriores, firmware de WVR-G54-NF Ver.2 .02 y anteriores, firmware de WZR-G108 Ver.2.41 y anteriores, firmware de WZR-G54 Ver.2.41 y anteriores, firmware de WZR-HP-G54 Ver.2.41 y anteriores, firmware de WZR-RS-G54 Ver.2.55 y anteriores, y firmware de WZR-RS-G54HP Ver.2.55 y anteriores) permite a un atacante remoto habilitar la opci\u00f3n de depuraci\u00f3n y ejecutar c\u00f3digo arbitrario o comandos del Sistema Operativo, cambiar la configuraci\u00f3n, y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"A5870F64-5EE0-425F-B71E-DDE20BCDFD0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0BAD48-7DB1-4F5C-8503-D86397814FAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.04\",\"matchCriteriaId\":\"74DD66E3-90E8-4567-883A-04CE9412A80E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38861F63-A04A-4EF0-B3E8-D4EA979EE1AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"A9D050ED-860A-4154-8402-8A6214C5D9AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5EEF7B-42BC-4755-98F6-CFA2FAD956B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"21DD735D-16B3-424A-ADF9-48B4FD2923AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126F7265-9B71-44E5-8C9D-7187A9A615E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"D99B403F-8E68-4A1B-86F9-CEB0C89F3BDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E26714-316A-493C-A87E-9045EC964C24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"8CB556A4-0E37-48EA-8A41-94916F84A6D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7F11A5-614F-4DC2-A6F4-F50929B35CB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"F1E3DE3C-C479-44EC-98FE-C6651344ADF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC28158A-3AC9-4845-B3FC-DA0D15F1A234\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"2E3CD564-DF11-4BCE-AE47-F492B1E34D47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE55F75-F79C-43D2-B0EC-0606E09BEBA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.25\",\"matchCriteriaId\":\"59ECCE87-35AE-4DE4-A64D-7266EA2C1DF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9C7FD1B-522F-4F5F-B70D-7974629CECD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"8971EBC0-38A9-4ADD-BF54-377711B7A202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424D75EE-6A08-4BAE-ABA2-3AA0CB66AE09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"53AC2B3D-1AC2-4A4B-8574-0281BE8D0112\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC638B4-5AA5-4FB7-BF81-93284B4C383D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"243CA979-35B8-480B-88B1-D2396C2B1EBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A9D554A-7834-4F8F-B09A-60B07BA68183\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"8C27DCC1-4BAA-4FDB-981C-620FB673DCFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6CE343-E4AA-4193-8F14-3D3636336C39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10\",\"matchCriteriaId\":\"B1CDF075-F252-420A-8D95-665B459286A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5666A7B5-F61D-407F-92EB-BF617494FAAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.24\",\"matchCriteriaId\":\"A4F8B41F-6323-4A4F-8C04-778E9C9E353A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C10BFB1-5279-4B83-B718-C2DDA278EE39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.24\",\"matchCriteriaId\":\"6D55ABAA-1134-44BA-96C4-94D342D80925\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D1EDA2-5FFC-4BEF-8896-47C9B321A9EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"DB4F145F-F986-43E5-B673-3960E4036ACC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98B6936-7028-493E-8172-F0B37814E50D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"41D3D3A5-C320-4B64-A229-FE2C5456D13C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D2A48F-F9A2-493D-9BB3-E9532D23CE94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"AA1CA814-9908-42F4-A8AD-A7DED8A64D96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFF863A-47DE-4DA4-94A7-35C500C6EDE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"F70B3D38-C263-42DA-9132-2C655F1006D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27242BE1-FE1D-4375-8B58-25ED9C72D5CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"A7D2A4EF-E2D7-482B-B8F9-078458A32E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA95E36-C07F-49A5-8249-175A0A58988E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"5B1FDE14-9E3D-4471-AB45-32DB47320776\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E976B4-E92C-4D89-9451-D7D1F71E341B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"95C16CD8-DA3C-40E5-82E3-E642179E8B00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B4520B-6782-4C95-B042-9190A972133C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"86B74E01-FFA3-431A-B5EB-BB17861906C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A94087-2F4D-4839-BB49-87EDF2B46E45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"56D7C0BC-E88A-457D-B741-2E27C32F1137\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A94806-CC4D-490D-B219-4A4DCEF19FC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"26A426BB-E1D2-4C9D-9E44-CC4DCC162DF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F5259C-9D25-43F8-B83C-6484C21589FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"AB5162DD-0A9B-4C57-8AAD-424EF1AB1EBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68182904-2100-4AEF-B155-26C76E4A95AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"2C23ADB3-DAFC-4039-9C82-29FC1A30158C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC65A05-7452-488B-984C-D5FF8F675806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"D2000A0E-9E6C-4804-BA57-3AD4223D0933\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"719095B6-A2D4-44F5-B38D-ADEB4DB16DEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.02\",\"matchCriteriaId\":\"F15611D1-3D46-4824-B3A7-D61475D4D39B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086A819B-D0FE-4689-8647-3A0C128ABAE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"5F9AE0C2-2D7E-4C91-9212-18696307E6A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4286D1A-0E67-44BC-9E2C-19118CA9D7D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"2F026AD1-4117-44DE-BE84-6DE9EE65A290\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"220B227C-AEF5-403D-83E5-FC739168E0EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"6E907479-F6A4-40D5-A859-4ED7421BC93A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49734A6A-1CD2-4866-8A43-5D31E319C1A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"D4AAB693-433F-4952-9A76-A44FAC2D7D9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E1F62B-EF45-4945-A2A8-5FC6576FEB5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"B827DA8E-11E7-46E0-8B87-707D82F2BB55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3576314-AF31-4C42-A526-507F86DCF59D\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU90274525/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.buffalo.jp/news/detail/20210427-02.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU90274525/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.buffalo.jp/news/detail/20210427-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…