Authentication Bypass in WAPM-1166D and WAPM-APG600H Firmware by Buffalo
CVE-2017-2126

9.8CRITICAL

Key Information:

Vendor
CVE Published:
22 July 2017

What is CVE-2017-2126?

The vulnerability in WAPM-1166D and WAPM-APG600H firmware allows remote attackers to gain unauthorized access to the configuration interface, creating significant security risks. By exploiting unspecified vectors, attackers can bypass authentication mechanisms, potentially compromising the device and its connected network. Users are advised to check their firmware versions and apply security updates to mitigate this risk.

Affected Version(s)

WAPM-1166D firmware Ver.1.2.7 and earlier

WAPM-APG600H firmware Ver.1.16.1 and earlier

References

EPSS Score

13% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.