Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
1 vulnerability found for wapm-apg300n by buffalo
VAR-201606-0175
Vulnerability from variot - Updated: 2025-04-13 23:29BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201606-0175",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wapm-apg300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.62"
},
{
"model": "wzr-600dhp3",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-600dhp",
"scope": "eq",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.97"
},
{
"model": "bhr-4grv",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "whr-300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "fs-600dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "3.34"
},
{
"model": "wzr-300hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1166dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "wcr-300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.86"
},
{
"model": "wzr-hp-g301nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "wzr-450hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.97"
},
{
"model": "wzr-s900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-hp-ag300h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.73"
},
{
"model": "wzr-900dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-450hp-cwt",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.92"
},
{
"model": "wxr-1900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.34"
},
{
"model": "wzr-450hp-ub",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-hp-g450h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.87"
},
{
"model": "wapm-ag300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.62"
},
{
"model": "wzr-s1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-d1100h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-s600dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "dwr-hp-g300nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "wpl-05g300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.86"
},
{
"model": "whr-300hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1750dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-hp-g302h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.83"
},
{
"model": "wzr-900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.11"
},
{
"model": "wxr-1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.42"
},
{
"model": "wzr-900dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.13"
},
{
"model": "whr-hp-g300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1166dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "wzr-hp-g300nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "hw-450hp-zwe",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.91"
},
{
"model": "wzr-600dhp3",
"scope": "lte",
"trust": 0.8,
"vendor": "buffalo",
"version": "ver.2.16"
},
{
"model": "wzr-s600dhp",
"scope": "lte",
"trust": 0.8,
"vendor": "buffalo",
"version": "ver.2.16"
},
{
"model": "wzr-600dhp3 \u003c=ver.2.16",
"scope": null,
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-s600dhp \u003c=ver.2.16",
"scope": null,
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-600dhp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-450hp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-hp-g301nh",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-600dhp3",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wxr-1750dhp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-450hp-cwt",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "hw-450hp-zwe",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-900dhp2",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wcr-300",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-hp-g450h",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc.",
"sources": [
{
"db": "BID",
"id": "90905"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4816",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4816",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2016-000087",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2016-03694",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-93635",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2016-4816",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2016-000087",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4816",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2016-000087",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-03694",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201605-674",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-93635",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4816"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "VULHUB",
"id": "VHN-93635"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4816",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVN75813272",
"trust": 3.1
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-03694",
"trust": 0.6
},
{
"db": "BID",
"id": "90905",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-93635",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"id": "VAR-201606-0175",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
}
],
"trust": 1.0713480954545453
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
}
]
},
"last_update_date": "2025-04-13T23:29:29.650000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "BUFFALO INC. website",
"trust": 0.8,
"url": "http://buffalo.jp/support_s/s20160527a.html"
},
{
"title": "Patch for BuffaloWZR-600DHP3 and WZR-S600DHP Information Disclosure Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/76685"
},
{
"title": "Buffalo WZR-600DHP3 and WZR-S600DHP Repair measures for information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://jvn.jp/en/jp/jvn75813272/index.html"
},
{
"trust": 2.3,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2016-000087"
},
{
"trust": 1.7,
"url": "http://buffalo.jp/support_s/s20160527a.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4816"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4816"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"date": "2016-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-93635"
},
{
"date": "2016-05-27T00:00:00",
"db": "BID",
"id": "90905"
},
{
"date": "2016-05-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"date": "2016-05-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"date": "2016-06-19T01:59:11.043000",
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"date": "2016-06-21T00:00:00",
"db": "VULHUB",
"id": "VHN-93635"
},
{
"date": "2016-05-27T00:00:00",
"db": "BID",
"id": "90905"
},
{
"date": "2016-06-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"date": "2016-06-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Buffalo wireless LAN routers vulnerable to information disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.6
}
}