First published: Fri Mar 09 2018(Updated: )
Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier allows an attacker to bypass authentication and execute arbitrary commands on the device via unspecified vectors.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Buffalo WXR-1900DHP2 | <=2.48 | |
Buffalo WXR-1900DHP2 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0521 is a vulnerability in Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier that allows an attacker to bypass authentication and execute arbitrary commands on the device.
CVE-2018-0521 has a severity rating of 8.8 (High).
An attacker can exploit CVE-2018-0521 by bypassing authentication and executing arbitrary commands on the Buffalo WXR-1900DHP2 device.
Yes, users should update their Buffalo WXR-1900DHP2 firmware to version 2.49 or later to fix CVE-2018-0521.
You can find more information about CVE-2018-0521 on the Buffalo support website (http://buffalo.jp/support_s/s20180223.html) and the JVN database (https://jvn.jp/en/jp/JVN97144273/index.html).