cve-2016-4816
Vulnerability from cvelistv5
Published
2016-06-19 01:00
Modified
2024-08-06 00:39
Severity ?
EPSS score ?
Summary
BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors.
References
▼ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://buffalo.jp/support_s/s20160527a.html | Patch, Vendor Advisory | |
vultures@jpcert.or.jp | http://jvn.jp/en/jp/JVN75813272/index.html | Vendor Advisory | |
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://buffalo.jp/support_s/s20160527a.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN75813272/index.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:39:26.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2016-000087", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087" }, { "name": "JVN#75813272", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN75813272/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://buffalo.jp/support_s/s20160527a.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-06-19T01:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2016-000087", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087" }, { "name": "JVN#75813272", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN75813272/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://buffalo.jp/support_s/s20160527a.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2016-4816", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2016-000087", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087" }, { "name": "JVN#75813272", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN75813272/index.html" }, { "name": "http://buffalo.jp/support_s/s20160527a.html", "refsource": "CONFIRM", "url": "http://buffalo.jp/support_s/s20160527a.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2016-4816", "datePublished": "2016-06-19T01:00:00", "dateReserved": "2016-05-17T00:00:00", "dateUpdated": "2024-08-06T00:39:26.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-4816\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2016-06-19T01:59:11.043\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Dispositivos BUFFALO WZR-600DHP3 con firmware 2.16 y versiones anteriores y dispositivos WZR-S600DHP permiten a atacantes remotos descubrir credenciales y otra informaci\u00f3n sensible a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-600dhp3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303225E6-81C0-4A2F-81A3-51E508DDA0EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-600dhp3_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"D7A7ED42-5F7F-4597-BE1F-4CA63EDC5069\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:hw-450hp-zwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BE2F24-8A3F-426F-B935-62F82F83E457\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:hw-450hp-zwe_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.91\",\"matchCriteriaId\":\"4F4A6233-DA68-44E6-8EA4-947ADEEF9ED6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g450h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72BEF724-6B38-4862-A74D-9FB7F5EB4233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g450h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.87\",\"matchCriteriaId\":\"5FAB2A24-0FC9-466D-839B-ABEC730F2CBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6014747F-30BA-4C65-8340-CA16C886A45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.97\",\"matchCriteriaId\":\"5848CECD-F71A-43D4-AA7B-FA50215EB51F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247B99DF-EE96-40C3-89FC-706DE878ABFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"69F8C9DD-2F18-4A53-83B6-28203376C5F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wcr-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00FE286D-145C-4B81-AFEF-ADC6194458D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wcr-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.86\",\"matchCriteriaId\":\"53F7743A-FB27-47C3-9E75-B65CA719930B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp-cwt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"348D05E5-E619-4AE9-8A62-DF214899DB17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp-cwt_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.92\",\"matchCriteriaId\":\"D1B53FDC-F4D5-433A-A189-F38714C1C5F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g301nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A753B947-1562-4147-965B-6437C4328F44\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g301nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"3FFB8CC4-80EA-4542-8608-B7996A919874\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wxr-1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22CD8F33-A455-4E4B-9351-CBBDA511E9D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wxr-1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.42\",\"matchCriteriaId\":\"B043BD21-4605-4A9D-B60E-969CD440D4E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06AF9040-7F63-4E80-82DD-7448320BC940\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-600dhp_firmware:1.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7672C0B-ACB3-4AED-9B66-DA1F16B423F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55459AEE-CE6D-4A4B-9B59-572EDFD51984\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"C43EFB78-AE26-4F3B-AEA8-846CAE1CC691\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s1750dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2F15AE-7A2C-46C0-8961-10180279FEB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s1750dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"2B9E6F20-5560-4ECC-B728-87BB4EEDEE7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342ABB1C-DEB2-4B34-B5FB-A3D072B4760F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"38CE7BBB-1D8C-479B-802A-A1C07B3F513D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75434B7A-2633-4981-B99D-33448883BC61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s600dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"59915998-08D7-4FFC-B240-09F8EA216B1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g302h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE42D0C-2181-47E3-87AA-A50C0C3ED002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g302h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.83\",\"matchCriteriaId\":\"3E26D83F-3905-4499-AD73-783F2F3E4FE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wapm-ag300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233EE67A-5432-46BA-9FAA-C21746B43233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wapm-ag300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.62\",\"matchCriteriaId\":\"3560F6BE-2C04-4DA4-85A3-89513E8847CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-ag300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DBC06D-0003-4196-A360-59657454DAF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-ag300h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.73\",\"matchCriteriaId\":\"72525A05-EF18-488F-BD12-7C99E383E2C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-d1100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BB1A7E-19AD-4897-B20F-03BDA7DCFA8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-d1100h_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"28AD57C0-031D-4BC5-9453-15CDEEC60EEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wpl-05g300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C24CCE-813A-4F11-B4A5-2AF075018F2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wpl-05g300_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.86\",\"matchCriteriaId\":\"F979E851-583F-4235-AE0D-8218968A4723\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-s900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C186F6-8DE5-4C82-8403-D3BB76069FCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-s900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.16\",\"matchCriteriaId\":\"05D10EE2-C4A9-42D0-9861-4E91FBF22327\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:dwr-hp-g300nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE96F509-FF8C-409B-BB40-E05A9F722554\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:dwr-hp-g300nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"8D496DE0-10A3-4DCE-932E-E4EDFA3973AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697F6576-D774-4DC8-A2C9-A57F4E037F24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-300hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"A74B3BC3-19CF-40A2-97D7-6800F692FDEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1750dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFF4B91-1173-4346-A1ED-60B37F7B44DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1750dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.28\",\"matchCriteriaId\":\"E50E0E39-CCAF-4E48-916B-7DF3317D4FE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1166dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740500B4-8CEC-4044-8FE7-194FD0894534\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1166dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.13\",\"matchCriteriaId\":\"03C0AF66-B7EF-4245-99F2-5FE62470EFC2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-300hp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80FFBDA4-E1A4-46CC-8EE0-6C92CB5C0A03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-300hp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"84FD1A44-9971-4D65-849D-C1A8B034E42D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wapm-apg300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C61889-C999-43F4-8D1A-7383D1C21A92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wapm-apg300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.62\",\"matchCriteriaId\":\"2BE524BA-6D70-46C4-9002-32BA31951711\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"247B99DF-EE96-40C3-89FC-706DE878ABFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.13\",\"matchCriteriaId\":\"C7D26FF7-7C08-4238-8F14-CD138BDA8834\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wxr-1900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2F4145-1A55-41CE-9358-0192B69CA8E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wxr-1900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.34\",\"matchCriteriaId\":\"068996A2-F2FE-4AD8-9E9E-049902FA4F1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-900dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8BD47F3-29D0-4B34-A346-C0042FBD75ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-900dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11\",\"matchCriteriaId\":\"F0D917DA-1562-471B-97AF-81C4E58E4CD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-1166dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98CE6294-43B2-4043-98A5-BCCAF17214C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-1166dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.13\",\"matchCriteriaId\":\"EF260608-2B7C-4005-89F8-71310536AE79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:whr-hp-g300n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7E26183-35D3-4A44-8D9A-AB358957C75F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:whr-hp-g300n_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"A1231F93-4129-4092-8A67-C8546A98EA95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:bhr-4grv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48780EC9-0E32-4DB5-91C2-3DD9048BCDA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:bhr-4grv_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"D1266023-4C53-44D7-85EE-A9ED9A9B57C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-450hp-ub:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5923DA5-CF09-408D-BE0D-A878EFB8BB6B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-450hp-ub_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.96\",\"matchCriteriaId\":\"B522C6AF-B042-4A51-93DE-01006DC89F9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:wzr-hp-g300nh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3BFED6-500A-49C0-BBE1-E9AB5525C143\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:wzr-hp-g300nh_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.81\",\"matchCriteriaId\":\"85EAF404-0DEE-455D-B5F7-F24B802933A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:buffalo:fs-600dhp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3511D6-1738-43DD-ACBB-76D5C998906E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:buffalo:fs-600dhp_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.34\",\"matchCriteriaId\":\"62943135-66C6-4B76-9E0E-6D13C8AE0D41\"}]}]}],\"references\":[{\"url\":\"http://buffalo.jp/support_s/s20160527a.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75813272/index.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://buffalo.jp/support_s/s20160527a.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN75813272/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2016-000087\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.