Description
Authentication bypass issue exists in BUFFALO Wi-Fi router products, which may allow an attacker to alter critical configuration settings without authentication.
Published: 2026-03-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration change
Action: Patch Now
AI Analysis

Impact

The vulnerability is an authentication bypass that permits an attacker to modify critical configuration settings on Buffalo Wi‑Fi routers without providing valid credentials. The official description states that such an attacker can alter configuration without authentication, which directly threatens the integrity of the device’s network settings and potentially its overall security posture.

Affected Systems

The affected devices are Buffalo Wi‑Fi router products distributed by Buffalo Inc. No specific firmware versions are listed, so all models that have not applied a firmware update which addresses this issue are potentially vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity vulnerability. Because the flaw does not require any authentication, the likely attack vector is remote, as an attacker could send crafted traffic over the network to the router. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but the high severity and remote nature of the exploitability warrant immediate action to mitigate the risk of unauthorized configuration changes.

Generated by OpenCVE AI on March 27, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Visit the Buffalo support site and download the latest firmware update that addresses the authentication bypass issue.
  • Apply the firmware update following the vendor’s installation instructions.
  • After updating, change the default administrative credentials to a strong, unique password.
  • If remote management is enabled, restrict access to trusted IP addresses or disable it entirely unless a specific need exists.

Generated by OpenCVE AI on March 27, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Title Authentication Bypass in Buffalo Wi‑Fi Routers Allowing Unauthorized Configuration Changes

Fri, 27 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description Authentication bypass issue exists in BUFFALO Wi-Fi router products, which may allow an attacker to alter critical configuration settings without authentication.
Weaknesses CWE-288
References
Metrics cvssV3_0

{'score': 7.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-03-27T05:25:19.851Z

Reserved: 2026-03-25T06:25:32.059Z

Link: CVE-2026-32678

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T06:16:38.650

Modified: 2026-03-27T06:16:38.650

Link: CVE-2026-32678

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:13Z

Weaknesses