All the vulnerabilites related to BUFFALO INC. - WZR-600DHP3 firmware
jvndb-2016-000087
Vulnerability from jvndb
Published
2016-05-27 13:53
Modified
2016-06-27 14:59
Severity ?
Summary
Multiple Buffalo wireless LAN routers vulnerable to information disclosure
Details
Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability.
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
BUFFALO INC. | WZR-600DHP3 firmware | |
BUFFALO INC. | WZR-S600DHP firmware |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000087.html", "dc:date": "2016-06-27T14:59+09:00", "dcterms:issued": "2016-05-27T13:53+09:00", "dcterms:modified": "2016-06-27T14:59+09:00", "description": "Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability.\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000087.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware", "@product": "WZR-600DHP3 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware", "@product": "WZR-S600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "@version": "2.0" }, { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000087", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN75813272/index.html", "@id": "JVN#75813272", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4816", "@id": "CVE-2016-4816", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4816", "@id": "CVE-2016-4816", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-200", "@title": "Information Exposure(CWE-200)" } ], "title": "Multiple Buffalo wireless LAN routers vulnerable to information disclosure" }
jvndb-2016-000086
Vulnerability from jvndb
Published
2016-05-27 13:53
Modified
2016-06-27 14:58
Severity ?
Summary
Multiple Buffalo wireless LAN routers vulnerable to directory traversal
Details
Multiple wireless LAN routers provided by BUFFALO INC. contain a directory traversal vulnerability (CWE-22).
Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
BUFFALO INC. | WZR-600DHP3 firmware | |
BUFFALO INC. | WZR-S600DHP firmware |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000086.html", "dc:date": "2016-06-27T14:58+09:00", "dcterms:issued": "2016-05-27T13:53+09:00", "dcterms:modified": "2016-06-27T14:58+09:00", "description": "Multiple wireless LAN routers provided by BUFFALO INC. contain a directory traversal vulnerability (CWE-22).\r\n\r\nToshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2016/JVNDB-2016-000086.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware", "@product": "WZR-600DHP3 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware", "@product": "WZR-S600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": [ { "@score": "3.3", "@severity": "Low", "@type": "Base", "@vector": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, { "@score": "6.5", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "@version": "3.0" } ], "sec:identifier": "JVNDB-2016-000086", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN81698369/index.html", "@id": "JVN#81698369", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4815", "@id": "CVE-2016-4815", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4815", "@id": "CVE-2016-4815", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "Multiple Buffalo wireless LAN routers vulnerable to directory traversal" }
jvndb-2022-002444
Vulnerability from jvndb
Published
2022-10-05 17:44
Modified
2022-10-13 16:28
Severity ?
Summary
Multiple vulnerabilities in Buffalo network devices
Details
Multiple network devices provided by Buffalo Inc. contain multiple vulnerabilities listed below.
* Hidden Functionality (CWE-912) - CVE-2022-39044
* Use of Hard-coded Credentials (CWE-798) - CVE-2022-34840
* Authentication Bypass (CWE-288) - CVE-2022-4096
Chuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU92805279/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-39044 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-34840 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2022-40966 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-34840 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-39044 | |
NVD | https://nvd.nist.gov/vuln/detail/CVE-2022-40966 | |
Authentication Bypass Using an Alternate Path or Channel(CWE-288) | https://cwe.mitre.org/data/definitions/288.html | |
Use of Hard-coded Credentials(CWE-798) | https://cwe.mitre.org/data/definitions/798.html | |
Hidden Functionality(CWE-912) | https://cwe.mitre.org/data/definitions/912.html |
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002444.html", "dc:date": "2022-10-13T16:28+09:00", "dcterms:issued": "2022-10-05T17:44+09:00", "dcterms:modified": "2022-10-13T16:28+09:00", "description": "Multiple network devices provided by Buffalo Inc. contain multiple vulnerabilities listed below.\r\n\r\n* Hidden Functionality (CWE-912) - CVE-2022-39044\r\n* Use of Hard-coded Credentials (CWE-798) - CVE-2022-34840\r\n* Authentication Bypass (CWE-288) - CVE-2022-4096\r\n\r\nChuya Hayakawa of 00One, Inc. reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-002444.html", "sec:cpe": [ { "#text": "cpe:/o:buffalo_inc:bhr-4grv_firmware", "@product": "BHR-4GRV firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:bhr-4grv_firmware", "@product": "BHR-4GRV firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:dwr-hp-g300nh_firmware", "@product": "DWR-HP-G300NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:dwr-pg_firmware", "@product": "DWR-PG firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-600dhp_firmware", "@product": "FS-600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-600dhp_firmware", "@product": "FS-600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-g300n_firmware", "@product": "FS-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-g300n_firmware", "@product": "FS-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-hp-g300n_firmware", "@product": "FS-HP-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-hp-g300n_firmware", "@product": "FS-HP-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-r600dhp_firmware", "@product": "FS-R600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:fs-r600dhp_firmware", "@product": "FS-R600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:hw-450hp-zwe_firmware", "@product": "HW-450HP-ZWE firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wcr-300_firmware", "@product": "WCR-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wem-1266_firmware", "@product": "WEM-1266WP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wem-1266_firmwpware", "@product": "WEM-1266 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wer-a54g54_firmware", "@product": "WER-A54G54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wer-ag54_firmware", "@product": "WER-AG54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wer-am54g54_firmware", "@product": "WER-AM54G54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wer-amg54_firmware", "@product": "WER-AMG54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-300hp_firmware", "@product": "WHR-300HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-300_firmware", "@product": "WHR-300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-am54g54_firmware", "@product": "WHR-AM54G54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-amg54_firmware", "@product": "WHR-AMG54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-ampg_firmware", "@product": "WHR-AMPG firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-g300n_firmware", "@product": "WHR-G301N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-g301n_firmware", "@product": "WHR-G301N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-g54s-ni_firmware", "@product": "WHR-G54S-NI firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-g54s_firmware", "@product": "WHR-G54S firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-g_firmware", "@product": "WHR-G firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-hp-ampg_firmware", "@product": "WHR-HP-AMPG firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-hp-g300n_firmware", "@product": "WHR-HP-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-hp-g54_firmware", "@product": "WHR-HP-G54 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-hp-gn_firmware", "@product": "WHR-HP-GN firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:whr-hp-g_firmware", "@product": "WHR-HP-G firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wlae-ag300n_firmware", "@product": "WLAE-AG300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wlae-ag300n_firmware", "@product": "WLAE-AG300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wli-h4-d600_firmware", "@product": "WLI-H4-D600 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wli-tx4-ag300n_firmware", "@product": "WLI-TX4-AG300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wpl-05g300_firmware", "@product": "WPL-05G300 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wrm-d2133hp_firmware", "@product": "WRM-D2133HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wrm-d2133hs_firmware", "@product": "WRM-D2133HS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:ws024bf-nw_firmware", "@product": "WS024BF-NW firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:ws024bf_firmware", "@product": "WS024BF firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wtr-m2133hp_firmware", "@product": "WTR-M2133HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wtr-m2133hs_firmware", "@product": "WTR-M2133HS firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-1750dhp2_firmware", "@product": "WXR-1750DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-1750dhp_firmware", "@product": "WXR-1750DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-1900dhp2_firmware", "@product": "WXR-1900DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-1900dhp3_firmware", "@product": "WXR-1900DHP3 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-1900dhp_firmware", "@product": "WXR-1900DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-5950ax12_firmware", "@product": "WXR-5950AX12 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-6000ax12b_firmware", "@product": "WXR-6000AX12B firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wxr-6000ax12s_firmware", "@product": "WXR-6000AX12S firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-1166dhp2_firmware", "@product": "WZR-1166DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-1166dhp_firmware", "@product": "WZR-1166DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-1750dhp2_firmware", "@product": "WZR-1750DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-1750dhp_firmware", "@product": "WZR-1750DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-300hp_firmware", "@product": "WZR-300HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-300hp_firmware", "@product": "WZR-300HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-450hp-cwt_firmware", "@product": "WZR-450HP-CWT firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-450hp-ub_firmware", "@product": "WZR-450HP-UB firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-450hp_firmware", "@product": "WZR-450HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-450hp_firmware", "@product": "WZR-450HP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-600dhp2_firmware", "@product": "WZR-600DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware", "@product": "WZR-600DHP3 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-600dhp_firmware", "@product": "WZR-600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-600dhp_firmware", "@product": "WZR-600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-900dhp2_firmware", "@product": "WZR-900DHP2 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-900dhp_firmware", "@product": "WZR-900DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-900dhp_firmware", "@product": "WZR-900DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-agl300nh_firmware", "@product": "WZR-AGL300NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-ampg144nh_firmware", "@product": "WZR-AMPG144NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-ampg300nh_firmware", "@product": "WZR-AMPG300NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-d1100h_firmware", "@product": "WZR-D1100H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-g144nh_firmware", "@product": "WZR-G144NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-g144n_firmware", "@product": "WZR-G144N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-ag300h_firmware", "@product": "WZR-HP-AG300H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-ag300h_firmware", "@product": "WZR-HP-AG300H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-g300nh_firmware", "@product": "WZR-HP-G300NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-g301nh_firmware", "@product": "WZR-HP-G301NH firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-g302h_firmware", "@product": "WZR-HP-G302H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-g302h_firmware", "@product": "WZR-HP-G302H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-hp-g450h_firmware", "@product": "WZR-HP-G450H firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-s1750dhp_firmware", "@product": "WZR-S1750DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware", "@product": "WZR-S600DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr-s900dhp_firmware", "@product": "WZR-S900DHP firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr2-g108_firmware", "@product": "WZR2-G108 firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" }, { "#text": "cpe:/o:buffalo_inc:wzr2-g300n_firmware", "@product": "WZR2-G300N firmware", "@vendor": "BUFFALO INC.", "@version": "2.2" } ], "sec:cvss": { "@score": "8.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2022-002444", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU92805279/index.html", "@id": "JVNVU#92805279", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-39044", "@id": "CVE-2022-39044", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-34840", "@id": "CVE-2022-34840", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2022-40966", "@id": "CVE-2022-40966", "@source": "CVE" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-34840", "@id": "CVE-2022-34840", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-39044", "@id": "CVE-2022-39044", "@source": "NVD" }, { "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-40966", "@id": "CVE-2022-40966", "@source": "NVD" }, { "#text": "https://cwe.mitre.org/data/definitions/288.html", "@id": "CWE-288", "@title": "Authentication Bypass Using an Alternate Path or Channel(CWE-288)" }, { "#text": "https://cwe.mitre.org/data/definitions/798.html", "@id": "CWE-798", "@title": "Use of Hard-coded Credentials(CWE-798)" }, { "#text": "https://cwe.mitre.org/data/definitions/912.html", "@id": "CWE-912", "@title": "Hidden Functionality(CWE-912)" } ], "title": "Multiple vulnerabilities in Buffalo network devices" }