First published: Tue Sep 10 2024(Updated: )
OS command injection vulnerability exists in BUFFALO wireless LAN routers and wireless LAN repeaters. If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
BUFFALO Wireless LAN Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-44072 is considered a high severity vulnerability due to its potential for arbitrary OS command execution.
To fix CVE-2024-44072, users should immediately update their BUFFALO wireless LAN routers and wireless LAN repeaters to the latest firmware version provided by the manufacturer.
CVE-2024-44072 affects BUFFALO wireless LAN routers and wireless LAN repeaters that are accessed through the management page.
Attackers exploiting CVE-2024-44072 can execute arbitrary OS commands on the affected devices, leading to potential system compromise.
Currently, the best course of action for CVE-2024-44072 is to apply the firmware update or limit access to the management page until the update can be completed.