Description
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
Related CPE's
References
https://www.kb.cert.org/vuls/id/914124
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/
https://www.tenable.com/security/research/tra-2021-13
https://www.kb.cert.org/vuls/id/914124
https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/
https://www.tenable.com/security/research/tra-2021-13
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20090
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Analyzed
Published
2021-04-29T13:15:10.630Z
4 years agoLast modified
2025-11-03T17:59:30.060Z
4 months ago