Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Buffalo
Buffalo wex-1800ax4 |
|
| Vendors & Products |
Buffalo
Buffalo wex-1800ax4 |
Fri, 07 Nov 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker. | |
| Weaknesses | CWE-916 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-11-07T13:15:18.610Z
Reserved: 2025-10-30T02:34:37.562Z
Link: CVE-2025-46413
Updated: 2025-11-07T13:15:07.026Z
Status : Deferred
Published: 2025-11-07T09:15:38.787
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-46413
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:34:49Z