.. / CVE-2021-20092

Exploit for Buffalo WSR-2533DHPL2 - Improper Access Control (CVE-2021-20092)

Description:

The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor.

Nuclei Template

View the template here CVE-2021-20092.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-20092.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://www.tenable.com/security/research/tra-2021-13
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2021-20091
https://medium.com/tenable-techblog/bypassing-authentication-on-arcadyan-routers-with-cve-2021-20090-and-rooting-some-buffalo-ea1dd30980c2