First published: Mon Dec 19 2022(Updated: )
Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, WSR-3200AX4B firmware Ver. 1.25, WSR-2533DHP2 firmware Ver. 1.22 and earlier, WSR-A2533DHP2 firmware Ver. 1.22 and earlier, WSR-2533DHP3 firmware Ver. 1.26 and earlier, WSR-A2533DHP3 firmware Ver. 1.26 and earlier, WSR-2533DHPL2 firmware Ver. 1.03 and earlier, WSR-2533DHPLS firmware Ver. 1.07 and earlier, WEX-1800AX4 firmware Ver. 1.13 and earlier, and WEX-1800AX4EA firmware Ver. 1.13 and earlier allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command if a specially crafted request is sent to a specific CGI program.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Buffalo Wsr-3200ax4s Firmware | <=1.26 | |
Buffalo Wsr-3200ax4s Firmware | ||
All of | ||
Buffalo WSR-3200AX4B Firmware | =1.25 | |
Buffalo WSR-3200AX4B Firmware | ||
All of | ||
Buffalo WSR-A2533DHP2 Firmware | <=1.22 | |
Buffalo WSR-A2533DHP2 Firmware | ||
All of | ||
Buffalo WSR-A2533DHP2 Firmware | <=1.22 | |
Buffalo WSR-A2533DHP2 Firmware | ||
All of | ||
Buffalo WSR-A2533DHP3 Firmware | <=1.26 | |
Buffalo WSR-A2533DHP3 Firmware | ||
All of | ||
Buffalo Wsr-a2533dhp3 | <=1.26 | |
Buffalo WSR-A2533DHP3 Firmware | ||
All of | ||
Buffalo Wsr-2533dhpl2-bk Firmware | <=1.03 | |
Buffalo WSR-2533DHPL2-BK | ||
All of | ||
Buffalo WSR-2533DHPLS | <=1.07 | |
Buffalo WSR-2533DHPLS | ||
All of | ||
Buffalo Wex-1800ax4ea Firmware | <=1.13 | |
Buffalo Wex-1800ax4ea Firmware | ||
All of | ||
Buffalo Wex-1800ax4ea Firmware | <=1.13 | |
Buffalo Wex-1800ax4ea Firmware | ||
Buffalo Wsr-3200ax4s Firmware | <=1.26 | |
Buffalo Wsr-3200ax4s Firmware | ||
Buffalo WSR-3200AX4B Firmware | =1.25 | |
Buffalo WSR-3200AX4B Firmware | ||
Buffalo WSR-A2533DHP2 Firmware | <=1.22 | |
Buffalo WSR-A2533DHP2 Firmware | ||
Buffalo WSR-A2533DHP2 Firmware | <=1.22 | |
Buffalo WSR-A2533DHP2 Firmware | ||
Buffalo WSR-A2533DHP3 Firmware | <=1.26 | |
Buffalo WSR-A2533DHP3 Firmware | ||
Buffalo Wsr-a2533dhp3 | <=1.26 | |
Buffalo WSR-A2533DHP3 Firmware | ||
Buffalo Wsr-2533dhpl2-bk Firmware | <=1.03 | |
Buffalo WSR-2533DHPL2-BK | ||
Buffalo WSR-2533DHPLS | <=1.07 | |
Buffalo WSR-2533DHPLS | ||
Buffalo Wex-1800ax4ea Firmware | <=1.13 | |
Buffalo Wex-1800ax4ea Firmware | ||
Buffalo Wex-1800ax4ea Firmware | <=1.13 | |
Buffalo Wex-1800ax4ea Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43466 is a vulnerability in Buffalo network devices WSR-3200AX4S firmware Ver. 1.26 and earlier, WSR-3200AX4B firmware Ver. 1.25, WSR-2533DHP2 firmware Ver. 1.22 and earlier, WSR-A2533DHP2 firmware Ver. 1.22 and earlier, WSR-2533DHP3 firmware Ver. 1.26 and earlier, WSR-A2533DHP3 firmware Ver. 1.26 and earlier, WSR-2533DHPL2 firmware Ver. 1.03, and WSR-2533DHPLS firmware Ver. 1.07 that allows unauthorized access to the device.
The severity of CVE-2022-43466 is medium with a CVSS score of 6.8.
You can check if your Buffalo network device is affected by CVE-2022-43466 by referring to the vulnerability report provided by Buffalo or by contacting their support.
To fix the vulnerability CVE-2022-43466, you need to update your Buffalo network device to the latest firmware version provided by Buffalo.
You can find more information about CVE-2022-43466 on the official JVN website (https://jvn.jp/en/vu/JVNVU97099584/index.html) and the Buffalo news page (https://www.buffalo.jp/news/detail/20221205-01.html).