Buffalo network devices firmware versions 1.26 and earlier allow network-adjacent attackers to execute arbitrary OS commands
Reporter | Title | Published | Views | Family All 3 |
---|---|---|---|---|
![]() | Command injection | 19 Dec 202203:15 | – | prion |
![]() | CVE-2022-43443 | 19 Dec 202200:00 | – | cvelist |
![]() | CVE-2022-43443 | 19 Dec 202203:15 | – | nvd |
[
{
"vendor": "BUFFALO INC.",
"product": "WXR-11000XE12",
"versions": [
{
"version": "firmware Ver. 1.10 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WXR-5700AX7S",
"versions": [
{
"version": "firmware Ver. 1.27 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WXR-5700AX7B",
"versions": [
{
"version": "firmware Ver. 1.27 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-3200AX4S",
"versions": [
{
"version": "firmware Ver. 1.26 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-3200AX4B",
"versions": [
{
"version": "firmware Ver. 1.25",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHP",
"versions": [
{
"version": "firmware Ver. 1.08 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHP2",
"versions": [
{
"version": "firmware Ver. 1.22 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-A2533DHP2",
"versions": [
{
"version": "firmware Ver. 1.22 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHP3",
"versions": [
{
"version": "firmware Ver. 1.26 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-A2533DHP3",
"versions": [
{
"version": "firmware Ver. 1.26 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHPL",
"versions": [
{
"version": "firmware Ver. 1.08 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHPL2",
"versions": [
{
"version": "firmware Ver. 1.03 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHPLS",
"versions": [
{
"version": "firmware Ver. 1.07 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHPLB",
"versions": [
{
"version": "firmware Ver. 1.05",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-1166DHP",
"versions": [
{
"version": "firmware Ver. 1.16 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-1166DHP2",
"versions": [
{
"version": "firmware Ver. 1.17 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WCR-1166DS",
"versions": [
{
"version": "firmware Ver. 1.34 and earlier",
"status": "affected"
}
]
}
]
Source | Link |
---|---|
buffalo | www.buffalo.jp/news/detail/20240131-01.html |
jvn | www.jvn.jp/en/vu/JVNVU97099584/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo