A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | |
https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: tenable
Published: 2021-04-29T00:00:00
Updated: 2023-10-18T11:29:20.400358
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20090
JSON object: View
NVD Information
Status : Modified
Published: 2021-04-29T15:15:10.630
Modified: 2023-10-18T01:15:24.427
Link: CVE-2021-20090
JSON object: View
Redhat Information
No data.
CWE