Authentication Bypass in WAPM-1166D and WAPM-APG600H Firmware by Buffalo
CVE-2017-2126
9.8CRITICAL
What is CVE-2017-2126?
The vulnerability in WAPM-1166D and WAPM-APG600H firmware allows remote attackers to gain unauthorized access to the configuration interface, creating significant security risks. By exploiting unspecified vectors, attackers can bypass authentication mechanisms, potentially compromising the device and its connected network. Users are advised to check their firmware versions and apply security updates to mitigate this risk.
Affected Version(s)
WAPM-1166D firmware Ver.1.2.7 and earlier
WAPM-APG600H firmware Ver.1.16.1 and earlier
References
EPSS Score
13% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved