A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
References
| Link | Resource |
|---|---|
| https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
| https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
| https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
| https://www.kb.cert.org/vuls/id/914124 | Third Party Advisory US Government Resource |
| https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ | Exploit Third Party Advisory |
| https://www.tenable.com/security/research/tra-2021-13 | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20090 | US Government Resource |
Configurations
History
03 Nov 2025, 18:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-20090 - US Government Resource |
22 Oct 2025, 00:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 05:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.kb.cert.org/vuls/id/914124 - Third Party Advisory, US Government Resource | |
| References | () https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ - Exploit, Third Party Advisory | |
| References | () https://www.tenable.com/security/research/tra-2021-13 - Exploit, Third Party Advisory |
25 Jul 2024, 17:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.secpod.com/blog/arcadyan-based-routers-and-modems-under-active-exploitation/ - Exploit, Third Party Advisory |
26 Apr 2022, 17:05
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | (MISC) https://www.tenable.com/security/research/tra-2021-13 - Exploit, Third Party Advisory |
Information
Published : 2021-04-29 15:15
Updated : 2025-11-03 18:59
NVD link : CVE-2021-20090
Mitre link : CVE-2021-20090
CVE.ORG link : CVE-2021-20090
JSON object : View
Products Affected
buffalo
- wsr-2533dhp3-bk
- wsr-2533dhpl2-bk
- wsr-2533dhpl2-bk_firmware
- wsr-2533dhp3-bk_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
