Authentication Bypass in WAPM-1166D and WAPM-APG600H Firmware by Buffalo
CVE-2017-2126

9.8CRITICAL

Key Information:

Vendor
CVE Published:
22 July 2017

What is CVE-2017-2126?

The vulnerability in WAPM-1166D and WAPM-APG600H firmware allows remote attackers to gain unauthorized access to the configuration interface, creating significant security risks. By exploiting unspecified vectors, attackers can bypass authentication mechanisms, potentially compromising the device and its connected network. Users are advised to check their firmware versions and apply security updates to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

WAPM-1166D firmware Ver.1.2.7 and earlier

WAPM-APG600H firmware Ver.1.16.1 and earlier

References

EPSS Score

13% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.