First published: Sat Jul 22 2017(Updated: )
WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalo WAPM-1166D Firmware | <=1.2.7 | |
Buffalo WAPM-1166D | ||
Buffalo WAPM-APG600H | <=1.16.1 | |
Buffalo Wapm-apg600h Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2126 is classified as a vulnerability that allows remote unauthorized access, which can have serious security implications.
To fix CVE-2017-2126, upgrade the firmware of Buffalo WAPM-1166D to version 1.2.8 or later or WAPM-APG600H to version 1.16.2 or later.
CVE-2017-2126 affects Buffalo WAPM-1166D firmware versions 1.2.7 and earlier, as well as WAPM-APG600H firmware versions 1.16.1 and earlier.
CVE-2017-2126 allows remote attackers to bypass authentication methods and access the configuration interface of the devices.
CVE-2017-2126 is a remote vulnerability, allowing external attackers to exploit it without local access.