{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T01:19:40.849","vulnerabilities":[{"cve":{"id":"CVE-2022-43443","sourceIdentifier":"vultures@jpcert.or.jp","published":"2022-12-19T03:15:10.517","lastModified":"2025-04-17T15:15:48.553","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OS command injection vulnerability in Buffalo network devices allows an network-adjacent attacker to execute an arbitrary OS command if a specially crafted request is sent to the management page."},{"lang":"es","value":"Dispositivos de red Buffalo WSR-3200AX4S firmware Ver. 1.26 y anteriores, versión del firmware WSR-3200AX4B. 1.25, versión del firmware WSR-2533DHP. 1.08 y anteriores, versión del firmware WSR-2533DHP2. 1.22 y anteriores, versión del firmware WSR-A2533DHP2. 1.22 y anteriores, versión del firmware WSR-2533DHP3. 1.26 y anteriores, versión del firmware WSR-A2533DHP3. 1.26 y anteriores, versión del firmware WSR-2533DHPL. 1.08 y anteriores, versión del firmware WSR-2533DHPL2. 1.03 y anteriores, versión del firmware WSR-2533DHPLS. 1.07 y anteriores, y la versión del firmware WCR-1166DS. 1.34 y anteriores permiten a un atacante adyacente a la red ejecutar un comando arbitrario del sistema operativo si se envía una solicitud especialmente manipulada a la página de administración."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-3200ax4s_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.26","matchCriteriaId":"07164878-06B0-49DB-88D9-C149D72E67C4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-3200ax4s:-:*:*:*:*:*:*:*","matchCriteriaId":"AE5277EC-9BD1-40C3-B1B9-C67A1C45645C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-3200ax4b_firmware:1.25:*:*:*:*:*:*:*","matchCriteriaId":"30621C77-BB74-4862-A145-02113D009BF7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-3200ax4b:-:*:*:*:*:*:*:*","matchCriteriaId":"6BC6F897-46FE-4629-80EC-2740FBA080FF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhp2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.22","matchCriteriaId":"0A8060FF-BC01-493F-8C6A-367B6532CED1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhp2:-:*:*:*:*:*:*:*","matchCriteriaId":"08F476D3-8329-44B1-A2B0-B2AEB500863F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-a2533dhp2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.22","matchCriteriaId":"9EA7A67F-30F3-422E-9070-A2EA6353457E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-a2533dhp2:-:*:*:*:*:*:*:*","matchCriteriaId":"9BF474D3-21B8-47D5-BC18-443295C51638"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhp3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.26","matchCriteriaId":"C1259443-53C8-4787-B427-81FD177E68A1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhp3:-:*:*:*:*:*:*:*","matchCriteriaId":"AE0A99BA-2724-4F68-94F7-8825A0588E6F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-a2533dhp3_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.26","matchCriteriaId":"70BDFC2C-E148-4485-B2E6-33CA2276F751"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-a2533dhp3:-:*:*:*:*:*:*:*","matchCriteriaId":"B82FF3D2-7ACF-4121-AF92-4A0714EB0C7F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhpl2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.03","matchCriteriaId":"093EA797-1F83-4FAA-935E-31F8C9986857"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhpl2:-:*:*:*:*:*:*:*","matchCriteriaId":"31E5BEB1-FCA6-49E9-A244-7AE3DDF83373"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhpls_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.07","matchCriteriaId":"387619C1-3F85-43DC-A4B1-FF24E2AD8382"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhpls:-:*:*:*:*:*:*:*","matchCriteriaId":"310ACFB8-13EE-4A72-A9A0-3BFDAFF1ED1A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhp_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.08","matchCriteriaId":"366FE02C-D030-4D36-B9C4-167A58D38174"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhp:-:*:*:*:*:*:*:*","matchCriteriaId":"1574DB7C-A19C-45B5-AD37-4C0AFE8CC798"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wsr-2533dhpl_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.08","matchCriteriaId":"14367351-45B7-460E-80C2-D72609245466"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wsr-2533dhpl:-:*:*:*:*:*:*:*","matchCriteriaId":"C23EE312-9ADE-4B0B-B7ED-F61AC441E5DB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:buffalo:wcr-1166ds_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.34","matchCriteriaId":"EE85F7D6-76DB-47C6-BB61-1572B53E8D48"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:buffalo:wcr-1166ds:-:*:*:*:*:*:*:*","matchCriteriaId":"F5537A90-A060-4CB4-8912-D7994AE75196"}]}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU97099584/","source":"vultures@jpcert.or.jp"},{"url":"https://www.buffalo.jp/news/detail/20240131-01.html","source":"vultures@jpcert.or.jp"},{"url":"https://jvn.jp/en/vu/JVNVU97099584/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.buffalo.jp/news/detail/20240131-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}