Vulnerability Description
WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Buffalo | Wapm-1166D Firmware | <= 1.2.7 |
| Buffalo | Wapm-1166D | - |
| Buffalo | Wapm-Apg600H Firmware | <= 1.16.1 |
| Buffalo | Wapm-Apg600H | - |
Related Weaknesses (CWE)
References
- http://buffalo.jp/support_s/s20170718.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN48823557/index.htmlThird Party AdvisoryVDB Entry
- http://buffalo.jp/support_s/s20170718.htmlVendor Advisory
- https://jvn.jp/en/jp/JVN48823557/index.htmlThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-2126?
CVE-2017-2126 is a vulnerability with a CVSS score of 9.8 (CRITICAL). WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.
How severe is CVE-2017-2126?
CVE-2017-2126 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-2126?
Check the references section above for vendor advisories and patch information. Affected products include: Buffalo Wapm-1166D Firmware, Buffalo Wapm-1166D, Buffalo Wapm-Apg600H Firmware, Buffalo Wapm-Apg600H.