A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-04-29 15:15
Updated : 2025-03-19 20:56
NVD link : CVE-2021-20090
Mitre link : CVE-2021-20090
CVE.ORG link : CVE-2021-20090
JSON object : View
Products Affected
buffalo
- wsr-2533dhp3-bk
- wsr-2533dhpl2-bk
- wsr-2533dhp3-bk_firmware
- wsr-2533dhpl2-bk_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')