mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-06-20 09:50:49 +00:00
add Arcadyan_Routers_Authentication_Bypassing_CVE_2021_20090
This commit is contained in:
parent
5f7195eb14
commit
6206df14f6
Binary file not shown.
After Width: | Height: | Size: 1.3 MiB |
11
Arcadyan/CVE-2021-20090/README.md
Normal file
11
Arcadyan/CVE-2021-20090/README.md
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
# Arcadyan Routers Authentication Bypassing (CVE-2021–20090)
|
||||||
|
|
||||||
|
A path traversal vulnerability (CVE-2021-20090) in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication. This vulnerability also affected many other devices, as the root cause of the vulnerability exists in the underlying Arcadyan firmware.
|
||||||
|
|
||||||
|
Another vulnerabilities, using Configuration File Injection (CVE-2021-20091) to open telnetd and using Improper Access Control(CVE-2021-20092) to get admin password, have only been confirmed on Buffalo WSR-2533 models.
|
||||||
|
|
||||||
|
**FOFA query rule**: [body="css/style-ad-JP.css"](https://fofa.so/result?qbase64=Ym9keT0iY3NzL3N0eWxlLWFkLUpQLmNzcyI%3D)
|
||||||
|
|
||||||
|
# Demo
|
||||||
|
|
||||||
|

|
Loading…
x
Reference in New Issue
Block a user