cve-2016-4816
Vulnerability from cvelistv5
Published
2016-06-19 01:00
Modified
2024-08-06 00:39
Severity ?
Summary
BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:39:26.286Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2016-000087",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087"
          },
          {
            "name": "JVN#75813272",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN75813272/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://buffalo.jp/support_s/s20160527a.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-06-19T01:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2016-000087",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087"
        },
        {
          "name": "JVN#75813272",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN75813272/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://buffalo.jp/support_s/s20160527a.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2016-4816",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2016-000087",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087"
            },
            {
              "name": "JVN#75813272",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN75813272/index.html"
            },
            {
              "name": "http://buffalo.jp/support_s/s20160527a.html",
              "refsource": "CONFIRM",
              "url": "http://buffalo.jp/support_s/s20160527a.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2016-4816",
    "datePublished": "2016-06-19T01:00:00",
    "dateReserved": "2016-05-17T00:00:00",
    "dateUpdated": "2024-08-06T00:39:26.286Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-4816\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2016-06-19T01:59:11.043\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Dispositivos BUFFALO WZR-600DHP3 con firmware 2.16 y versiones anteriores y dispositivos WZR-S600DHP permiten a atacantes remotos descubrir credenciales y otra informaci\u00f3n sensible a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-600dhp3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303225E6-81C0-4A2F-81A3-51E508DDA0EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-600dhp3_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"D7A7ED42-5F7F-4597-BE1F-4CA63EDC5069\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:hw-450hp-zwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BE2F24-8A3F-426F-B935-62F82F83E457\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:hw-450hp-zwe_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.91\",\"matchCriteriaId\":\"4F4A6233-DA68-44E6-8EA4-947ADEEF9ED6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g450h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BEF724-6B38-4862-A74D-9FB7F5EB4233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g450h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.87\",\"matchCriteriaId\":\"5FAB2A24-0FC9-466D-839B-ABEC730F2CBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6014747F-30BA-4C65-8340-CA16C886A45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.97\",\"matchCriteriaId\":\"5848CECD-F71A-43D4-AA7B-FA50215EB51F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247B99DF-EE96-40C3-89FC-706DE878ABFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"69F8C9DD-2F18-4A53-83B6-28203376C5F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wcr-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00FE286D-145C-4B81-AFEF-ADC6194458D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wcr-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.86\",\"matchCriteriaId\":\"53F7743A-FB27-47C3-9E75-B65CA719930B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp-cwt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348D05E5-E619-4AE9-8A62-DF214899DB17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp-cwt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.92\",\"matchCriteriaId\":\"D1B53FDC-F4D5-433A-A189-F38714C1C5F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g301nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A753B947-1562-4147-965B-6437C4328F44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g301nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"3FFB8CC4-80EA-4542-8608-B7996A919874\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wxr-1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CD8F33-A455-4E4B-9351-CBBDA511E9D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wxr-1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.42\",\"matchCriteriaId\":\"B043BD21-4605-4A9D-B60E-969CD440D4E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06AF9040-7F63-4E80-82DD-7448320BC940\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-600dhp_firmware:1.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7672C0B-ACB3-4AED-9B66-DA1F16B423F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55459AEE-CE6D-4A4B-9B59-572EDFD51984\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"C43EFB78-AE26-4F3B-AEA8-846CAE1CC691\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2F15AE-7A2C-46C0-8961-10180279FEB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"2B9E6F20-5560-4ECC-B728-87BB4EEDEE7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342ABB1C-DEB2-4B34-B5FB-A3D072B4760F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"38CE7BBB-1D8C-479B-802A-A1C07B3F513D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75434B7A-2633-4981-B99D-33448883BC61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s600dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"59915998-08D7-4FFC-B240-09F8EA216B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g302h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE42D0C-2181-47E3-87AA-A50C0C3ED002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g302h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.83\",\"matchCriteriaId\":\"3E26D83F-3905-4499-AD73-783F2F3E4FE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wapm-ag300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233EE67A-5432-46BA-9FAA-C21746B43233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wapm-ag300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.62\",\"matchCriteriaId\":\"3560F6BE-2C04-4DA4-85A3-89513E8847CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-ag300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DBC06D-0003-4196-A360-59657454DAF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-ag300h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.73\",\"matchCriteriaId\":\"72525A05-EF18-488F-BD12-7C99E383E2C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-d1100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BB1A7E-19AD-4897-B20F-03BDA7DCFA8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-d1100h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"28AD57C0-031D-4BC5-9453-15CDEEC60EEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wpl-05g300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C24CCE-813A-4F11-B4A5-2AF075018F2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wpl-05g300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.86\",\"matchCriteriaId\":\"F979E851-583F-4235-AE0D-8218968A4723\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C186F6-8DE5-4C82-8403-D3BB76069FCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"05D10EE2-C4A9-42D0-9861-4E91FBF22327\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:dwr-hp-g300nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE96F509-FF8C-409B-BB40-E05A9F722554\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:dwr-hp-g300nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"8D496DE0-10A3-4DCE-932E-E4EDFA3973AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697F6576-D774-4DC8-A2C9-A57F4E037F24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-300hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"A74B3BC3-19CF-40A2-97D7-6800F692FDEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1750dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFF4B91-1173-4346-A1ED-60B37F7B44DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1750dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"E50E0E39-CCAF-4E48-916B-7DF3317D4FE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1166dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740500B4-8CEC-4044-8FE7-194FD0894534\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1166dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.13\",\"matchCriteriaId\":\"03C0AF66-B7EF-4245-99F2-5FE62470EFC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80FFBDA4-E1A4-46CC-8EE0-6C92CB5C0A03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-300hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"84FD1A44-9971-4D65-849D-C1A8B034E42D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wapm-apg300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C61889-C999-43F4-8D1A-7383D1C21A92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wapm-apg300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.62\",\"matchCriteriaId\":\"2BE524BA-6D70-46C4-9002-32BA31951711\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247B99DF-EE96-40C3-89FC-706DE878ABFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.13\",\"matchCriteriaId\":\"C7D26FF7-7C08-4238-8F14-CD138BDA8834\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wxr-1900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2F4145-1A55-41CE-9358-0192B69CA8E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wxr-1900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.34\",\"matchCriteriaId\":\"068996A2-F2FE-4AD8-9E9E-049902FA4F1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BD47F3-29D0-4B34-A346-C0042FBD75ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11\",\"matchCriteriaId\":\"F0D917DA-1562-471B-97AF-81C4E58E4CD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1166dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CE6294-43B2-4043-98A5-BCCAF17214C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1166dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.13\",\"matchCriteriaId\":\"EF260608-2B7C-4005-89F8-71310536AE79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-hp-g300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E26183-35D3-4A44-8D9A-AB358957C75F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-hp-g300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"A1231F93-4129-4092-8A67-C8546A98EA95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:bhr-4grv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48780EC9-0E32-4DB5-91C2-3DD9048BCDA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:bhr-4grv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"D1266023-4C53-44D7-85EE-A9ED9A9B57C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp-ub:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5923DA5-CF09-408D-BE0D-A878EFB8BB6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp-ub_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"B522C6AF-B042-4A51-93DE-01006DC89F9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g300nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3BFED6-500A-49C0-BBE1-E9AB5525C143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g300nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"85EAF404-0DEE-455D-B5F7-F24B802933A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:fs-600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3511D6-1738-43DD-ACBB-76D5C998906E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:fs-600dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.34\",\"matchCriteriaId\":\"62943135-66C6-4B76-9E0E-6D13C8AE0D41\"}]}]}],\"references\":[{\"url\":\"http://buffalo.jp/support_s/s20160527a.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75813272/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://buffalo.jp/support_s/s20160527a.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75813272/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.