ID

VAR-201105-0127


CVE

CVE-2011-1324


TITLE

Multiple Buffalo routers vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2011-000025

DESCRIPTION

Multiple cross-site request forgery (CSRF) vulnerabilities in the management screen on Buffalo WHR, WZR2, WZR, WER, and BBR series routers with firmware 1.x; BHR-4RV and FS-G54 routers with firmware 2.x; and AS-100 routers allow remote attackers to hijack the authentication of administrators for requests that modify settings, as demonstrated by changing the login password. Multiple routers provided by Buffalo contain a cross-site request forgery vulnerability. Multiple routers provided by Buffalo have a management screen that allows users to modify settings. These routers contain a cross-site request forgery vulnerability due to an issue in the management screen. Hirotaka Katagiri reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a user views a malicious page while logged into the management screen, settings such as the login password may be altered. Successful exploits can result in privileged commands running on the affected devices, including enabling remote access to the web administration interface. This may lead to further network-based attacks. A remote attacker can exploit this vulnerability to hijack the administrator's authentication request to modify settings, such as changing the login password

Trust: 1.98

sources: NVD: CVE-2011-1324 // JVNDB: JVNDB-2011-000025 // BID: 47893 // VULHUB: VHN-49269

AFFECTED PRODUCTS

vendor:buffalotechmodel:fs-g54scope:eqversion:2.07

Trust: 1.6

vendor:buffalotechmodel:wzr-g144nhscope:eqversion:1.45

Trust: 1.6

vendor:buffalotechmodel:wzr-g144nhscope:eqversion:1.47

Trust: 1.6

vendor:buffalotechmodel:whr-hp-ampgscope:eqversion:1.32

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.31

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.32

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-am54g54scope:eqversion:1.42

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.38

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.30

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.23

Trust: 1.0

vendor:buffalotechmodel:whr-gscope:eqversion:1.46

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.48

Trust: 1.0

vendor:buffalotechmodel:wer-amg54scope:eqversion:1.11

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.01

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.42

Trust: 1.0

vendor:buffalotechmodel:as-100scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.40

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nhscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.33

Trust: 1.0

vendor:buffalotechmodel:whr-hp-gscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wzr-ampg144nhscope:eqversion:1.47

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.10

Trust: 1.0

vendor:buffalotechmodel:wzr-ampg300nhscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-amg54scope:eqversion:1.38

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.11

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.40

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.31

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.04

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.03

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.31

Trust: 1.0

vendor:buffalotechmodel:wzr2-g300nscope:eqversion:1.48

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.20

Trust: 1.0

vendor:buffalotechmodel:wer-am54g54scope:eqversion:1.13

Trust: 1.0

vendor:buffalotechmodel:whr-amg54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-amg54scope:eqversion:1.42

Trust: 1.0

vendor:buffalotechmodel:wzr2-g300nscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.01

Trust: 1.0

vendor:buffalotechmodel:whr-am54g54scope:eqversion:1.30

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.30

Trust: 1.0

vendor:buffalotechmodel:wer-am54g54scope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:wer-amg54scope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wer-ag54scope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:whr-gscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.02

Trust: 1.0

vendor:buffalotechmodel:whr-ampgscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.20

Trust: 1.0

vendor:buffalotechmodel:whr-am54g54scope:eqversion:1.38

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.03

Trust: 1.0

vendor:buffalotechmodel:wer-ag54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nscope:eqversion:1.47

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nhscope:eqversion:1.48

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.23

Trust: 1.0

vendor:buffalotechmodel:fs-g54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wer-amg54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.00

Trust: 1.0

vendor:buffalotechmodel:wzr-ampg300nhscope:eqversion:1.48

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.32

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.11

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wer-am54g54scope:eqversion:1.14

Trust: 1.0

vendor:buffalotechmodel:wer-amg54scope:eqversion:1.14

Trust: 1.0

vendor:buffalotechmodel:whr-am54g54scope:eqversion:1.40

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.04

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nscope:eqversion:1.45

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.38

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.10

Trust: 1.0

vendor:buffalotechmodel:wzr2-g300nscope:eqversion:1.50

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-amg54scope:eqversion:1.31

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.42

Trust: 1.0

vendor:buffalotechmodel:wer-am54g54scope:eqversion:1.11

Trust: 1.0

vendor:buffalotechmodel:whr-g54sscope:eqversion:1.21

Trust: 1.0

vendor:buffalotechmodel:wer-am54g54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-am54g54scope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:wer-ag54scope:eqversion:1.04

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.00

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.10

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.13

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.20

Trust: 1.0

vendor:buffalotechmodel:whr-hp-ampgscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.21

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.12

Trust: 1.0

vendor:buffalotechmodel:wzr-ampg144nhscope:eqversion:1.48

Trust: 1.0

vendor:buffalotechmodel:whr-ampgscope:eqversion:1.46

Trust: 1.0

vendor:buffalotechmodel:wzr-g144nscope:eqversion:1.46

Trust: 1.0

vendor:buffalotechmodel:wzr-ampg144nhscope:eqversion:*

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.42

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.33

Trust: 1.0

vendor:buffalotechmodel:bbr-4hgscope:eqversion:1.32

Trust: 1.0

vendor:buffalotechmodel:whr-hp-gscope:eqversion:1.46

Trust: 1.0

vendor:buffalotechmodel:whr-hp-g54scope:eqversion:1.20

Trust: 1.0

vendor:buffalotechmodel:bbr-4mgscope:eqversion:1.33

Trust: 1.0

vendor:buffalotechmodel:whr-amg54scope:eqversion:1.40

Trust: 1.0

vendor:buffalotechmodel:wer-a54g54scope:eqversion:1.02

Trust: 1.0

vendor:buffalotechmodel:bhr-4rvscope:eqversion:2.46

Trust: 1.0

vendor:buffalomodel:bbr-4hgscope:eqversion:and other routers

Trust: 0.8

vendor:buffalotechmodel:bhr-4rvscope: - version: -

Trust: 0.6

vendor:buffalotechmodel:whr-gscope: - version: -

Trust: 0.6

vendor:buffalotechmodel:whr-hp-gscope: - version: -

Trust: 0.6

vendor:buffalotechmodel:whr-ampgscope: - version: -

Trust: 0.6

vendor:buffalotechmodel:fs-g54scope: - version: -

Trust: 0.6

vendor:buffalotechmodel:as-100scope: - version: -

Trust: 0.6

vendor:buffalomodel:technology wireless broadband router wbrg54scope:eqversion:1.11

Trust: 0.3

vendor:buffalomodel:technology whr-g54sscope:eqversion:1.2

Trust: 0.3

vendor:buffalomodel:technology wireless-n nfiniti wzr-hp-g300nhscope: - version: -

Trust: 0.3

vendor:buffalomodel:technology wireless-n nfiniti whr-g300nscope: - version: -

Trust: 0.3

vendor:buffalomodel:technology wireless-n nfiniti whr-g300uscope: - version: -

Trust: 0.3

vendor:buffalomodel:technology wireless broadband router wbrg54scope:eqversion:1.13

Trust: 0.3

vendor:buffalomodel:technology airstation whr-g54sscope:eqversion:1.2

Trust: 0.3

vendor:buffalomodel:technology wireless-n nfiniti whr-hp-g300nscope: - version: -

Trust: 0.3

sources: BID: 47893 // JVNDB: JVNDB-2011-000025 // CNNVD: CNNVD-201105-115 // NVD: CVE-2011-1324

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-1324
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2011-000025
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201105-115
value: MEDIUM

Trust: 0.6

VULHUB: VHN-49269
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-1324
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2011-000025
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-49269
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-49269 // JVNDB: JVNDB-2011-000025 // CNNVD: CNNVD-201105-115 // NVD: CVE-2011-1324

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-49269 // JVNDB: JVNDB-2011-000025 // NVD: CVE-2011-1324

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201105-115

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201105-115

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000025

PATCH

title:Multiple routers vulnerable to cross-site request forgeryurl:http://buffalo.jp/support_s/20080808/csrf.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-000025

EXTERNAL IDS

db:NVDid:CVE-2011-1324

Trust: 2.8

db:JVNid:JVN50505257

Trust: 2.8

db:JVNDBid:JVNDB-2011-000025

Trust: 0.8

db:CNNVDid:CNNVD-201105-115

Trust: 0.7

db:JVNid:JVN#50505257

Trust: 0.6

db:BIDid:47893

Trust: 0.4

db:VULHUBid:VHN-49269

Trust: 0.1

sources: VULHUB: VHN-49269 // BID: 47893 // JVNDB: JVNDB-2011-000025 // CNNVD: CNNVD-201105-115 // NVD: CVE-2011-1324

REFERENCES

url:http://jvn.jp/en/jp/jvn50505257/index.html

Trust: 2.0

url:http://buffalo.jp/support_s/20080808/csrf.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1324

Trust: 0.8

url:http://jvn.jp/en/jp/jvn50505257

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-1324

Trust: 0.8

url:http://www.buffalotech.com/products/wireless/wireless-n-routers-access-points/

Trust: 0.3

sources: VULHUB: VHN-49269 // BID: 47893 // JVNDB: JVNDB-2011-000025 // CNNVD: CNNVD-201105-115 // NVD: CVE-2011-1324

CREDITS

Hirotaka Katagiri

Trust: 0.3

sources: BID: 47893

SOURCES

db:VULHUBid:VHN-49269
db:BIDid:47893
db:JVNDBid:JVNDB-2011-000025
db:CNNVDid:CNNVD-201105-115
db:NVDid:CVE-2011-1324

LAST UPDATE DATE

2025-04-11T23:10:01.447000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-49269date:2011-05-27T00:00:00
db:BIDid:47893date:2011-05-17T00:00:00
db:JVNDBid:JVNDB-2011-000025date:2011-05-11T00:00:00
db:CNNVDid:CNNVD-201105-115date:2011-05-10T00:00:00
db:NVDid:CVE-2011-1324date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-49269date:2011-05-09T00:00:00
db:BIDid:47893date:2011-05-17T00:00:00
db:JVNDBid:JVNDB-2011-000025date:2011-05-11T00:00:00
db:CNNVDid:CNNVD-201105-115date:2011-05-10T00:00:00
db:NVDid:CVE-2011-1324date:2011-05-09T19:55:03.507