ID CVE-2017-2126 Type cve Reporter cve@mitre.org Modified 2017-07-27T13:00:00
Description
WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.
{"jvn": [{"lastseen": "2019-05-29T19:49:04", "bulletinFamily": "info", "cvelist": ["CVE-2017-2126"], "description": "\n ## Description\n\nWAPM-1166D and WAPM-APG600H provided by BUFFALO INC. are wireless LAN access point devices. WAPM-1166D and WAPM-APG600H do not properly perform authentication ([CWE-287](<https://cwe.mitre.org/data/definitions/287.html>)).\n\n ## Impact\n\nAn attacker who can access the device may log in via telnet without authentication and access the configuration interface of the device.\n\n ## Solution\n\n**Update the Firmware** \nApply the appropriate firmware update according to the information provided by the developer.\n\n ## Products Affected\n\n * WAPM-1166D firmware Ver.1.2.7 and earlier\n * WAPM-APG600H firmware Ver.1.16.1 and earlier\n", "edition": 5, "modified": "2017-07-20T00:00:00", "published": "2017-07-20T00:00:00", "id": "JVN:48823557", "href": "http://jvn.jp/en/jp/JVN48823557/index.html", "title": "JVN#48823557: Multiple Buffalo wireless LAN access point devices do not properly perform authentication", "type": "jvn", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}