Published:2024/08/23  Last Updated:2024/08/23

JVN#12824024
BUFFALO wireless LAN routers and wireless LAN repeaters vulnerable to OS command injection

Overview

BUFFALO wireless LAN routers and wireless LAN repeaters contain an OS command injection vulnerability.

Products Affected

  • WHR-1166DHP2 Ver. 2.95 and earlier
  • WHR-1166DHP3 Ver. 2.95 and earlier
  • WHR-1166DHP4 Ver. 2.95 and earlier
  • WSR-1166DHP3 Ver. 1.18 and earlier
  • WSR-600DHP Ver. 2.93 and earlier
  • WEX-300HPTX/N Ver. 1.02 and earlier
  • WEX-733DHP2 Ver. 1.03 and earlier
  • WEX-1166DHP2 Ver. 1.05 and earlier
  • WEX-1166DHPS Ver. 1.05 and earlier
  • WEX-300HPS/N Ver. 1.02 and earlier
  • WEX-733DHPS Ver. 1.02 and earlier
  • WEX-733DHPTX Ver. 1.03 and earlier
  • WEX-1166DHP Ver. 1.23 and earlier
  • WEX-733DHP Ver. 1.64 and earlier
  • WHR-1166DHP Ver. 2.92 and earlier
  • WHR-300HP2 Ver. 2.51 and earlier
  • WHR-600D Ver. 2.91 and earlier
  • WMR-300 Ver. 2.50 and earlier

Description

Wireless LAN routers and wireless LAN repeaters provided by BUFFALO INC. contain an OS command injection vulnerability (CWE-78).

Impact

If a user logs in to the management page and sends a specially crafted request to the affected product from the product's specific management page, an arbitrary OS command may be executed.

Solution

Update the firmware
Update the firmware to the latest version according to the information provided by the developer.

Vendor Status

Vendor Status Last Update Vendor Notes
BUFFALO INC. Vulnerable 2024/08/23 BUFFALO INC. website

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score: 7.2
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

Yoshiki Mori and Masaki Kubo of National Institute of Information and Communications Technology, Cybersecurity Research Laboratory reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-44072
JVN iPedia JVNDB-2024-000087