Description
OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may be executed on the products.
Published: 2026-03-27
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via arbitrary OS command injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to inject operating system commands through a web interface on affected BUFFALO Wi‑Fi router products. Executing such commands gives the attacker full control of the device, enabling data exfiltration, persistent compromise, or use of the router as a launch pad for further attacks. The weakness is a classic OS command injection flaw.

Affected Systems

BUFFALO Wi‑Fi router products are impacted. Specific model names and firmware versions are not detailed in the advisory, so all devices in the BUFFALO Wi‑Fi product line should be treated as potentially vulnerable until further information is obtained.

Risk and Exploitability

With a CVSS score of 8.6, the vulnerability is classified as high severity. Exploit probability data from EPSS is unavailable, and the issue is not currently listed in the CISA KEV catalog. The attack vector is inferred to be remote, originating from interactions with the router’s web interface; no local prerequisites are described, suggesting that any network‑connected user who can access the interface may be able to exploit the flaw.

Generated by OpenCVE AI on March 27, 2026 at 07:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update released for the affected BUFFALO Wi‑Fi router models
  • Confirm the firmware version after the update to ensure the vulnerability fix is present
  • If no update is available, restrict external access to the router’s administration interface or disconnect it from the network until a patch can be applied
  • Check the Buffalo support website or the provided advisories for further guidance

Generated by OpenCVE AI on March 27, 2026 at 07:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may be executed on the products.
Weaknesses CWE-78
References
Metrics cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-03-27T05:24:35.501Z

Reserved: 2026-03-25T06:25:30.930Z

Link: CVE-2026-27650

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T06:16:38.257

Modified: 2026-03-27T06:16:38.257

Link: CVE-2026-27650

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:15Z

Weaknesses