VAR-201606-0175
Vulnerability from variot - Updated: 2025-04-13 23:29BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201606-0175",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wapm-apg300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.62"
},
{
"model": "wzr-600dhp3",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-600dhp",
"scope": "eq",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.97"
},
{
"model": "bhr-4grv",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "whr-300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "fs-600dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "3.34"
},
{
"model": "wzr-300hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1166dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "wcr-300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.86"
},
{
"model": "wzr-hp-g301nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "wzr-450hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.97"
},
{
"model": "wzr-s900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-hp-ag300h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.73"
},
{
"model": "wzr-900dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "wzr-450hp-cwt",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.92"
},
{
"model": "wxr-1900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.34"
},
{
"model": "wzr-450hp-ub",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-hp-g450h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.87"
},
{
"model": "wapm-ag300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.62"
},
{
"model": "wzr-s1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-d1100h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-s600dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.16"
},
{
"model": "dwr-hp-g300nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "wpl-05g300",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.86"
},
{
"model": "whr-300hp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1750dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.28"
},
{
"model": "wzr-hp-g302h",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.83"
},
{
"model": "wzr-900dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.11"
},
{
"model": "wxr-1750dhp",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.42"
},
{
"model": "wzr-900dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.13"
},
{
"model": "whr-hp-g300n",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.96"
},
{
"model": "wzr-1166dhp2",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "2.13"
},
{
"model": "wzr-hp-g300nh",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.81"
},
{
"model": "hw-450hp-zwe",
"scope": "lte",
"trust": 1.0,
"vendor": "buffalo",
"version": "1.91"
},
{
"model": "wzr-600dhp3",
"scope": "lte",
"trust": 0.8,
"vendor": "buffalo",
"version": "ver.2.16"
},
{
"model": "wzr-s600dhp",
"scope": "lte",
"trust": 0.8,
"vendor": "buffalo",
"version": "ver.2.16"
},
{
"model": "wzr-600dhp3 \u003c=ver.2.16",
"scope": null,
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-s600dhp \u003c=ver.2.16",
"scope": null,
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-600dhp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-450hp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-hp-g301nh",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-600dhp3",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wxr-1750dhp",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-450hp-cwt",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "hw-450hp-zwe",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-900dhp2",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wcr-300",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
},
{
"model": "wzr-hp-g450h",
"scope": "eq",
"trust": 0.6,
"vendor": "buffalo",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:buffalo_inc:wzr-600dhp3_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:buffalo_inc:wzr-s600dhp_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc.",
"sources": [
{
"db": "BID",
"id": "90905"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.9
},
"cve": "CVE-2016-4816",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2016-4816",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2016-000087",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2016-03694",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-93635",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2016-4816",
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "JVNDB-2016-000087",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-4816",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2016-000087",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2016-03694",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201605-674",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-93635",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "BUFFALO WZR-600DHP3 devices with firmware 2.16 and earlier and WZR-S600DHP devices allow remote attackers to discover credentials and other sensitive information via unspecified vectors. Multiple Buffalo wireless LAN routers contain an information disclosure vulnerability. Toshitsugu Yoneyama of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Information such as authentication credentials may be disclosed by an unauthenticated remote attacker. The Buffalo WZR-600DHP3 and WZR-S600DHP are both wireless router products of the Buffalo Group in Japan. A remote attacker can exploit this vulnerability to obtain sensitive information",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-4816"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "VULHUB",
"id": "VHN-93635"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-4816",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVN75813272",
"trust": 3.1
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-03694",
"trust": 0.6
},
{
"db": "BID",
"id": "90905",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-93635",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"id": "VAR-201606-0175",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
}
],
"trust": 1.0713480954545453
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
}
]
},
"last_update_date": "2025-04-13T23:29:29.650000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "BUFFALO INC. website",
"trust": 0.8,
"url": "http://buffalo.jp/support_s/s20160527a.html"
},
{
"title": "Patch for BuffaloWZR-600DHP3 and WZR-S600DHP Information Disclosure Vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/76685"
},
{
"title": "Buffalo WZR-600DHP3 and WZR-S600DHP Repair measures for information disclosure vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61984"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.1,
"url": "http://jvn.jp/en/jp/jvn75813272/index.html"
},
{
"trust": 2.3,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2016-000087"
},
{
"trust": 1.7,
"url": "http://buffalo.jp/support_s/s20160527a.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4816"
},
{
"trust": 0.8,
"url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4816"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"db": "VULHUB",
"id": "VHN-93635"
},
{
"db": "BID",
"id": "90905"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"date": "2016-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-93635"
},
{
"date": "2016-05-27T00:00:00",
"db": "BID",
"id": "90905"
},
{
"date": "2016-05-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"date": "2016-05-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"date": "2016-06-19T01:59:11.043000",
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-05-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-03694"
},
{
"date": "2016-06-21T00:00:00",
"db": "VULHUB",
"id": "VHN-93635"
},
{
"date": "2016-05-27T00:00:00",
"db": "BID",
"id": "90905"
},
{
"date": "2016-06-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-000087"
},
{
"date": "2016-06-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201605-674"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-4816"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple Buffalo wireless LAN routers vulnerable to information disclosure",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-000087"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201605-674"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.