CVE-2021-20716 (GCVE-0-2021-20716)
Vulnerability from cvelistv5 – Published: 2021-04-28 00:45 – Updated: 2024-08-03 17:53
VLAI?
Summary
Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.
Severity ?
No CVSS data available.
CWE
- Hidden Functionality
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| BUFFALO INC. | Buffalo network devices |
Affected:
BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 ...[truncated*]
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:21.257Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.buffalo.jp/news/detail/20210427-02.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Buffalo network devices",
"vendor": "BUFFALO INC.",
"versions": [
{
"status": "affected",
"version": "BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 ...[truncated*]"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Hidden Functionality",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-04-28T00:45:25",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.buffalo.jp/news/detail/20210427-02.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
}
],
"x_ConverterErrors": {
"version_name": {
"error": "version_name too long. Use array of versions to record more than one version.",
"message": "Truncated!"
}
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2021-20716",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Buffalo network devices",
"version": {
"version_data": [
{
"version_value": "BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior"
}
]
}
}
]
},
"vendor_name": "BUFFALO INC."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Hidden Functionality"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.buffalo.jp/news/detail/20210427-02.html",
"refsource": "MISC",
"url": "https://www.buffalo.jp/news/detail/20210427-02.html"
},
{
"name": "https://jvn.jp/en/vu/JVNVU90274525/index.html",
"refsource": "MISC",
"url": "https://jvn.jp/en/vu/JVNVU90274525/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2021-20716",
"datePublished": "2021-04-28T00:45:25",
"dateReserved": "2020-12-17T00:00:00",
"dateUpdated": "2024-08-03T17:53:21.257Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"A5870F64-5EE0-425F-B71E-DDE20BCDFD0F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A0BAD48-7DB1-4F5C-8503-D86397814FAA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.04\", \"matchCriteriaId\": \"74DD66E3-90E8-4567-883A-04CE9412A80E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38861F63-A04A-4EF0-B3E8-D4EA979EE1AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"A9D050ED-860A-4154-8402-8A6214C5D9AE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF5EEF7B-42BC-4755-98F6-CFA2FAD956B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"21DD735D-16B3-424A-ADF9-48B4FD2923AB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"126F7265-9B71-44E5-8C9D-7187A9A615E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.32\", \"matchCriteriaId\": \"D99B403F-8E68-4A1B-86F9-CEB0C89F3BDA\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18E26714-316A-493C-A87E-9045EC964C24\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"8CB556A4-0E37-48EA-8A41-94916F84A6D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD7F11A5-614F-4DC2-A6F4-F50929B35CB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"F1E3DE3C-C479-44EC-98FE-C6651344ADF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC28158A-3AC9-4845-B3FC-DA0D15F1A234\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"2E3CD564-DF11-4BCE-AE47-F492B1E34D47\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECE55F75-F79C-43D2-B0EC-0606E09BEBA6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.25\", \"matchCriteriaId\": \"59ECCE87-35AE-4DE4-A64D-7266EA2C1DF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9C7FD1B-522F-4F5F-B70D-7974629CECD2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"8971EBC0-38A9-4ADD-BF54-377711B7A202\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"424D75EE-6A08-4BAE-ABA2-3AA0CB66AE09\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"53AC2B3D-1AC2-4A4B-8574-0281BE8D0112\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAC638B4-5AA5-4FB7-BF81-93284B4C383D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.23\", \"matchCriteriaId\": \"243CA979-35B8-480B-88B1-D2396C2B1EBB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A9D554A-7834-4F8F-B09A-60B07BA68183\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.16\", \"matchCriteriaId\": \"8C27DCC1-4BAA-4FDB-981C-620FB673DCFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E6CE343-E4AA-4193-8F14-3D3636336C39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.10\", \"matchCriteriaId\": \"B1CDF075-F252-420A-8D95-665B459286A3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5666A7B5-F61D-407F-92EB-BF617494FAAD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.24\", \"matchCriteriaId\": \"A4F8B41F-6323-4A4F-8C04-778E9C9E353A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C10BFB1-5279-4B83-B718-C2DDA278EE39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.24\", \"matchCriteriaId\": \"6D55ABAA-1134-44BA-96C4-94D342D80925\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4D1EDA2-5FFC-4BEF-8896-47C9B321A9EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"DB4F145F-F986-43E5-B673-3960E4036ACC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E98B6936-7028-493E-8172-F0B37814E50D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"41D3D3A5-C320-4B64-A229-FE2C5456D13C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2D2A48F-F9A2-493D-9BB3-E9532D23CE94\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"AA1CA814-9908-42F4-A8AD-A7DED8A64D96\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BFF863A-47DE-4DA4-94A7-35C500C6EDE8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"F70B3D38-C263-42DA-9132-2C655F1006D0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27242BE1-FE1D-4375-8B58-25ED9C72D5CF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"A7D2A4EF-E2D7-482B-B8F9-078458A32E46\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAA95E36-C07F-49A5-8249-175A0A58988E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.54\", \"matchCriteriaId\": \"5B1FDE14-9E3D-4471-AB45-32DB47320776\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1E976B4-E92C-4D89-9451-D7D1F71E341B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"95C16CD8-DA3C-40E5-82E3-E642179E8B00\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43B4520B-6782-4C95-B042-9190A972133C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"86B74E01-FFA3-431A-B5EB-BB17861906C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06A94087-2F4D-4839-BB49-87EDF2B46E45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"56D7C0BC-E88A-457D-B741-2E27C32F1137\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71A94806-CC4D-490D-B219-4A4DCEF19FC7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"26A426BB-E1D2-4C9D-9E44-CC4DCC162DF2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74F5259C-9D25-43F8-B83C-6484C21589FD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.53\", \"matchCriteriaId\": \"AB5162DD-0A9B-4C57-8AAD-424EF1AB1EBD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68182904-2100-4AEF-B155-26C76E4A95AA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"2C23ADB3-DAFC-4039-9C82-29FC1A30158C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC65A05-7452-488B-984C-D5FF8F675806\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.20\", \"matchCriteriaId\": \"D2000A0E-9E6C-4804-BA57-3AD4223D0933\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"719095B6-A2D4-44F5-B38D-ADEB4DB16DEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.02\", \"matchCriteriaId\": \"F15611D1-3D46-4824-B3A7-D61475D4D39B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"086A819B-D0FE-4689-8647-3A0C128ABAE8\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"5F9AE0C2-2D7E-4C91-9212-18696307E6A0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4286D1A-0E67-44BC-9E2C-19118CA9D7D5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"2F026AD1-4117-44DE-BE84-6DE9EE65A290\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"220B227C-AEF5-403D-83E5-FC739168E0EF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.41\", \"matchCriteriaId\": \"6E907479-F6A4-40D5-A859-4ED7421BC93A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49734A6A-1CD2-4866-8A43-5D31E319C1A3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"D4AAB693-433F-4952-9A76-A44FAC2D7D9D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E1F62B-EF45-4945-A2A8-5FC6576FEB5A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.55\", \"matchCriteriaId\": \"B827DA8E-11E7-46E0-8B87-707D82F2BB55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3576314-AF31-4C42-A526-507F86DCF59D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.\"}, {\"lang\": \"es\", \"value\": \"Una funcionalidad Hidden en m\\u00faltiples dispositivos de red de Buffalo (firmware de BHR-4RV Ver.2.55 y anteriores, firmware de FS-G54 Ver.2.04 y anteriores, firmware de WBR2-B11 Ver.2.32 y anteriores, firmware de WBR2-G54 Ver.2 .32 y anteriores, firmware de WBR2-G54-KD Ver.2.32 y anteriores, firmware de WBR-B11 Ver.2.23 y anteriores, firmware de WBR-G54 Ver.2.23 y anteriores, firmware de WBR-G54L Ver.2.20 y anteriores, firmware de WHR2-A54G54 Ver.2 .25 y anteriores, firmware de WHR2-G54 Ver.2.23 y anteriores, firmware de WHR2-G54V Ver.2.55 y anteriores, firmware de WHR3-AG54 Ver.2.23 y anteriores, firmware de WHR-G54 Ver.2.16 y anteriores, firmware de WHR-G54-NF Ver.2 .10 y anteriores, firmware de WLA2-G54 Ver.2.24 y anteriores, firmware de WLA2-G54C Ver.2.24 y anteriores, firmware de WLA-B11 Ver.2.20 y anteriores, firmware de WLA-G54 Ver.2.20 y anteriores, firmware de WLA-G54C Ver.2.20 y anteriores, firmware de WLAH-A54G54 Ver.2 .54 y anteriores, firmware de WLAH-AM54G54 Ver.2.54 y anteriores, firmware de WLAH-G54 Ver.2.54 y anteriores, firmware de WLI2-TX1-AG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-G54 Ver.2 .20 y anteriores, firmware de WLI3-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI3-TX1-G54 Ver.2.53 y anteriores, firmware de WLI-T1-B11 Ver.2.20 y anteriores, firmware de WLI-TX1-G54 Ver.2.20 y anteriores, firmware de WVR-G54-NF Ver.2 .02 y anteriores, firmware de WZR-G108 Ver.2.41 y anteriores, firmware de WZR-G54 Ver.2.41 y anteriores, firmware de WZR-HP-G54 Ver.2.41 y anteriores, firmware de WZR-RS-G54 Ver.2.55 y anteriores, y firmware de WZR-RS-G54HP Ver.2.55 y anteriores) permite a un atacante remoto habilitar la opci\\u00f3n de depuraci\\u00f3n y ejecutar c\\u00f3digo arbitrario o comandos del Sistema Operativo, cambiar la configuraci\\u00f3n, y causar una condici\\u00f3n de denegaci\\u00f3n de servicio (DoS)\"}]",
"id": "CVE-2021-20716",
"lastModified": "2024-11-21T05:47:03.950",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-04-28T01:15:17.107",
"references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU90274525/index.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.buffalo.jp/news/detail/20210427-02.html\", \"source\": \"vultures@jpcert.or.jp\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU90274525/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.buffalo.jp/news/detail/20210427-02.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-20716\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2021-04-28T01:15:17.107\",\"lastModified\":\"2024-11-21T05:47:03.950\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hidden functionality in multiple Buffalo network devices (BHR-4RV firmware Ver.2.55 and prior, FS-G54 firmware Ver.2.04 and prior, WBR2-B11 firmware Ver.2.32 and prior, WBR2-G54 firmware Ver.2.32 and prior, WBR2-G54-KD firmware Ver.2.32 and prior, WBR-B11 firmware Ver.2.23 and prior, WBR-G54 firmware Ver.2.23 and prior, WBR-G54L firmware Ver.2.20 and prior, WHR2-A54G54 firmware Ver.2.25 and prior, WHR2-G54 firmware Ver.2.23 and prior, WHR2-G54V firmware Ver.2.55 and prior, WHR3-AG54 firmware Ver.2.23 and prior, WHR-G54 firmware Ver.2.16 and prior, WHR-G54-NF firmware Ver.2.10 and prior, WLA2-G54 firmware Ver.2.24 and prior, WLA2-G54C firmware Ver.2.24 and prior, WLA-B11 firmware Ver.2.20 and prior, WLA-G54 firmware Ver.2.20 and prior, WLA-G54C firmware Ver.2.20 and prior, WLAH-A54G54 firmware Ver.2.54 and prior, WLAH-AM54G54 firmware Ver.2.54 and prior, WLAH-G54 firmware Ver.2.54 and prior, WLI2-TX1-AG54 firmware Ver.2.53 and prior, WLI2-TX1-AMG54 firmware Ver.2.53 and prior, WLI2-TX1-G54 firmware Ver.2.20 and prior, WLI3-TX1-AMG54 firmware Ver.2.53 and prior, WLI3-TX1-G54 firmware Ver.2.53 and prior, WLI-T1-B11 firmware Ver.2.20 and prior, WLI-TX1-G54 firmware Ver.2.20 and prior, WVR-G54-NF firmware Ver.2.02 and prior, WZR-G108 firmware Ver.2.41 and prior, WZR-G54 firmware Ver.2.41 and prior, WZR-HP-G54 firmware Ver.2.41 and prior, WZR-RS-G54 firmware Ver.2.55 and prior, and WZR-RS-G54HP firmware Ver.2.55 and prior) allows a remote attacker to enable the debug option and to execute arbitrary code or OS commands, change the configuration, and cause a denial of service (DoS) condition.\"},{\"lang\":\"es\",\"value\":\"Una funcionalidad Hidden en m\u00faltiples dispositivos de red de Buffalo (firmware de BHR-4RV Ver.2.55 y anteriores, firmware de FS-G54 Ver.2.04 y anteriores, firmware de WBR2-B11 Ver.2.32 y anteriores, firmware de WBR2-G54 Ver.2 .32 y anteriores, firmware de WBR2-G54-KD Ver.2.32 y anteriores, firmware de WBR-B11 Ver.2.23 y anteriores, firmware de WBR-G54 Ver.2.23 y anteriores, firmware de WBR-G54L Ver.2.20 y anteriores, firmware de WHR2-A54G54 Ver.2 .25 y anteriores, firmware de WHR2-G54 Ver.2.23 y anteriores, firmware de WHR2-G54V Ver.2.55 y anteriores, firmware de WHR3-AG54 Ver.2.23 y anteriores, firmware de WHR-G54 Ver.2.16 y anteriores, firmware de WHR-G54-NF Ver.2 .10 y anteriores, firmware de WLA2-G54 Ver.2.24 y anteriores, firmware de WLA2-G54C Ver.2.24 y anteriores, firmware de WLA-B11 Ver.2.20 y anteriores, firmware de WLA-G54 Ver.2.20 y anteriores, firmware de WLA-G54C Ver.2.20 y anteriores, firmware de WLAH-A54G54 Ver.2 .54 y anteriores, firmware de WLAH-AM54G54 Ver.2.54 y anteriores, firmware de WLAH-G54 Ver.2.54 y anteriores, firmware de WLI2-TX1-AG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI2-TX1-G54 Ver.2 .20 y anteriores, firmware de WLI3-TX1-AMG54 Ver.2.53 y anteriores, firmware de WLI3-TX1-G54 Ver.2.53 y anteriores, firmware de WLI-T1-B11 Ver.2.20 y anteriores, firmware de WLI-TX1-G54 Ver.2.20 y anteriores, firmware de WVR-G54-NF Ver.2 .02 y anteriores, firmware de WZR-G108 Ver.2.41 y anteriores, firmware de WZR-G54 Ver.2.41 y anteriores, firmware de WZR-HP-G54 Ver.2.41 y anteriores, firmware de WZR-RS-G54 Ver.2.55 y anteriores, y firmware de WZR-RS-G54HP Ver.2.55 y anteriores) permite a un atacante remoto habilitar la opci\u00f3n de depuraci\u00f3n y ejecutar c\u00f3digo arbitrario o comandos del Sistema Operativo, cambiar la configuraci\u00f3n, y causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS)\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:bhr-4rv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"A5870F64-5EE0-425F-B71E-DDE20BCDFD0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:bhr-4rv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0BAD48-7DB1-4F5C-8503-D86397814FAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:fs-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.04\",\"matchCriteriaId\":\"74DD66E3-90E8-4567-883A-04CE9412A80E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:fs-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38861F63-A04A-4EF0-B3E8-D4EA979EE1AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"A9D050ED-860A-4154-8402-8A6214C5D9AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF5EEF7B-42BC-4755-98F6-CFA2FAD956B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"21DD735D-16B3-424A-ADF9-48B4FD2923AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126F7265-9B71-44E5-8C9D-7187A9A615E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr2-g54-kd_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.32\",\"matchCriteriaId\":\"D99B403F-8E68-4A1B-86F9-CEB0C89F3BDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr2-g54-kd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18E26714-316A-493C-A87E-9045EC964C24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"8CB556A4-0E37-48EA-8A41-94916F84A6D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7F11A5-614F-4DC2-A6F4-F50929B35CB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"F1E3DE3C-C479-44EC-98FE-C6651344ADF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC28158A-3AC9-4845-B3FC-DA0D15F1A234\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wbr-g54l_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"2E3CD564-DF11-4BCE-AE47-F492B1E34D47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wbr-g54l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE55F75-F79C-43D2-B0EC-0606E09BEBA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-a54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.25\",\"matchCriteriaId\":\"59ECCE87-35AE-4DE4-A64D-7266EA2C1DF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-a54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9C7FD1B-522F-4F5F-B70D-7974629CECD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"8971EBC0-38A9-4ADD-BF54-377711B7A202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"424D75EE-6A08-4BAE-ABA2-3AA0CB66AE09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr2-g54v_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"53AC2B3D-1AC2-4A4B-8574-0281BE8D0112\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr2-g54v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC638B4-5AA5-4FB7-BF81-93284B4C383D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr3-ag54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.23\",\"matchCriteriaId\":\"243CA979-35B8-480B-88B1-D2396C2B1EBB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr3-ag54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A9D554A-7834-4F8F-B09A-60B07BA68183\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"8C27DCC1-4BAA-4FDB-981C-620FB673DCFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6CE343-E4AA-4193-8F14-3D3636336C39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-g54-nf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10\",\"matchCriteriaId\":\"B1CDF075-F252-420A-8D95-665B459286A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-g54-nf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5666A7B5-F61D-407F-92EB-BF617494FAAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla2-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.24\",\"matchCriteriaId\":\"A4F8B41F-6323-4A4F-8C04-778E9C9E353A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla2-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C10BFB1-5279-4B83-B718-C2DDA278EE39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla2-g54c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.24\",\"matchCriteriaId\":\"6D55ABAA-1134-44BA-96C4-94D342D80925\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla2-g54c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4D1EDA2-5FFC-4BEF-8896-47C9B321A9EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"DB4F145F-F986-43E5-B673-3960E4036ACC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98B6936-7028-493E-8172-F0B37814E50D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"41D3D3A5-C320-4B64-A229-FE2C5456D13C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2D2A48F-F9A2-493D-9BB3-E9532D23CE94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wla-g54c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"AA1CA814-9908-42F4-A8AD-A7DED8A64D96\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wla-g54c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFF863A-47DE-4DA4-94A7-35C500C6EDE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-a54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"F70B3D38-C263-42DA-9132-2C655F1006D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-a54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27242BE1-FE1D-4375-8B58-25ED9C72D5CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-am54g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"A7D2A4EF-E2D7-482B-B8F9-078458A32E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-am54g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA95E36-C07F-49A5-8249-175A0A58988E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wlah-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.54\",\"matchCriteriaId\":\"5B1FDE14-9E3D-4471-AB45-32DB47320776\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wlah-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E976B4-E92C-4D89-9451-D7D1F71E341B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-ag54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"95C16CD8-DA3C-40E5-82E3-E642179E8B00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-ag54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B4520B-6782-4C95-B042-9190A972133C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-amg54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"86B74E01-FFA3-431A-B5EB-BB17861906C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-amg54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06A94087-2F4D-4839-BB49-87EDF2B46E45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli2-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"56D7C0BC-E88A-457D-B741-2E27C32F1137\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli2-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A94806-CC4D-490D-B219-4A4DCEF19FC7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli3-tx1-amg54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"26A426BB-E1D2-4C9D-9E44-CC4DCC162DF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli3-tx1-amg54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F5259C-9D25-43F8-B83C-6484C21589FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli3-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.53\",\"matchCriteriaId\":\"AB5162DD-0A9B-4C57-8AAD-424EF1AB1EBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli3-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68182904-2100-4AEF-B155-26C76E4A95AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli-t1-b11_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"2C23ADB3-DAFC-4039-9C82-29FC1A30158C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli-t1-b11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC65A05-7452-488B-984C-D5FF8F675806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wli-tx1-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.20\",\"matchCriteriaId\":\"D2000A0E-9E6C-4804-BA57-3AD4223D0933\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wli-tx1-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"719095B6-A2D4-44F5-B38D-ADEB4DB16DEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wvr-g54-nf_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.02\",\"matchCriteriaId\":\"F15611D1-3D46-4824-B3A7-D61475D4D39B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wvr-g54-nf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086A819B-D0FE-4689-8647-3A0C128ABAE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-g108_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"5F9AE0C2-2D7E-4C91-9212-18696307E6A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-g108:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4286D1A-0E67-44BC-9E2C-19118CA9D7D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"2F026AD1-4117-44DE-BE84-6DE9EE65A290\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"220B227C-AEF5-403D-83E5-FC739168E0EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.41\",\"matchCriteriaId\":\"6E907479-F6A4-40D5-A859-4ED7421BC93A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49734A6A-1CD2-4866-8A43-5D31E319C1A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-rs-g54_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"D4AAB693-433F-4952-9A76-A44FAC2D7D9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-rs-g54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E1F62B-EF45-4945-A2A8-5FC6576FEB5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-rs-g54hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.55\",\"matchCriteriaId\":\"B827DA8E-11E7-46E0-8B87-707D82F2BB55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-rs-g54hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3576314-AF31-4C42-A526-507F86DCF59D\"}]}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU90274525/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.buffalo.jp/news/detail/20210427-02.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://jvn.jp/en/vu/JVNVU90274525/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.buffalo.jp/news/detail/20210427-02.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…