First published: Thu Apr 29 2021(Updated: )
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
Credit: vulnreport@tenable.com vulnreport@tenable.com vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arcadyan Buffalo Firmware | ||
All of | ||
Arcadyan Buffalo Firmware | <=1.02 | |
Buffalo Wsr-2533dhpl2 | ||
All of | ||
Buffalo Wsr-2533dhp3-bk Firmware | <=1.24 | |
Buffalo WSR-2533DHP3-BK | ||
Arcadyan Buffalo Firmware | <=1.02 | |
Buffalo Wsr-2533dhpl2 | ||
Buffalo Wsr-2533dhp3-bk Firmware | <=1.24 | |
Buffalo WSR-2533DHP3-BK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20090 is a path traversal vulnerability in Arcadyan Buffalo firmware that allows unauthenticated, remote attackers to bypass authentication and access sensitive information.
The vulnerability affects multiple routers across several different vendors using Arcadyan Buffalo firmware.
The severity of CVE-2021-20090 is rated as critical with a CVSS score of 9.8.
To fix CVE-2021-20090, update the firmware of affected routers to a patched version provided by the vendor.
More information about CVE-2021-20090 can be found at the following references: [1] [2] [3].