A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.kb.cert.org/vuls/id/914124 - Third Party Advisory, US Government Resource | |
References | () https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ - Exploit, Third Party Advisory | |
References | () https://www.tenable.com/security/research/tra-2021-13 - Exploit, Third Party Advisory |
25 Jul 2024, 17:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ - Exploit, Third Party Advisory |
18 Oct 2023, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2021-04-29 15:15
Updated : 2024-11-21 05:45
NVD link : CVE-2021-20090
Mitre link : CVE-2021-20090
CVE.ORG link : CVE-2021-20090
JSON object : View
Products Affected
buffalo
- wsr-2533dhp3-bk_firmware
- wsr-2533dhpl2-bk
- wsr-2533dhpl2-bk_firmware
- wsr-2533dhp3-bk
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')