CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
EPSS
Percentile
9.0%
Plaintext storage of a password issue exists in BUFFALO wireless LAN routers, which may allow a network-adjacent unauthenticated attacker with access to the product’s login page may obtain configured credentials.
Vendor | Product | Version | CPE |
---|---|---|---|
buffalo | wsr-2533dhp | 1.06 | cpe:2.3:h:buffalo:wsr-2533dhp:1.06:*:*:*:*:*:*:* |
buffalo | wsr-2533dhpl | 1.06 | cpe:2.3:h:buffalo:wsr-2533dhpl:1.06:*:*:*:*:*:*:* |
buffalo | wsr-2533dhp2 | 1.10 | cpe:2.3:h:buffalo:wsr-2533dhp2:1.10:*:*:*:*:*:*:* |
buffalo | wsr-a2533dhp2 | 1.10 | cpe:2.3:h:buffalo:wsr-a2533dhp2:1.10:*:*:*:*:*:*:* |
[
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHP",
"versions": [
{
"version": "firmware Ver. 1.06 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHPL",
"versions": [
{
"version": "firmware Ver. 1.06 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-2533DHP2",
"versions": [
{
"version": "firmware Ver. 1.10 and earlier",
"status": "affected"
}
]
},
{
"vendor": "BUFFALO INC.",
"product": "WSR-A2533DHP2",
"versions": [
{
"version": "firmware Ver. 1.10 and earlier",
"status": "affected"
}
]
}
]