First published: Tue Jun 09 2015(Updated: )
The Buffalo WHR-1166DHP 1.60 and earlier, WSR-600DHP 1.60 and earlier, WHR-600D 1.60 and earlier, WHR-300HP2 1.60 and earlier, WMR-300 1.60 and earlier, WEX-300 1.60 and earlier, and BHR-4GRV2 1.04 and earlier routers allow remote authenticated users to execute arbitrary OS commands via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalotech Wsr-600dhp Firmware | <=1.60 | |
Buffalo Technology WSR-600DHP | ||
Buffalotech Whr-300hp2 Firmware | <=1.60 | |
Buffalotech Whr-300hp2 Firmware | ||
Buffalotech WHR-1166DHP Firmware | <=1.60 | |
Buffalotech WHR-1166DHP | ||
Buffalo BHR-4GRV2 | <=1.04 | |
Buffalotech Bhr-4grv2 Firmware | ||
Buffalotech Wmr-300 | <=1.60 | |
Buffalotech Wmr-300 | ||
Buffalotech Wex-300 | <=1.60 | |
Buffalotech Wex-300 Firmware | ||
Buffalotech WHR-600D Firmware | <=1.60 | |
Buffalotech WHR-600D Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9284 has a critical severity level due to the potential for remote code execution.
To address CVE-2014-9284, update the affected Buffalo router firmware to the latest version beyond 1.60 for the specified models.
CVE-2014-9284 affects several Buffalo router models including WHR-1166DHP, WSR-600DHP, WHR-600D, WHR-300HP2, WMR-300, WEX-300, and BHR-4GRV2 with specific firmware versions.
Yes, CVE-2014-9284 can be exploited by remote authenticated users, making it a critical vulnerability.
CVE-2014-9284 is classified as an OS command injection vulnerability.