Description
Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker.
Published: 2025-11-07
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Buffalo
Buffalo wex-1800ax4
Vendors & Products Buffalo
Buffalo wex-1800ax4

Fri, 07 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 07 Nov 2025 09:00:00 +0000

Type Values Removed Values Added
Description Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker.
Weaknesses CWE-916
References
Metrics cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Buffalo Wex-1800ax4
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2025-11-07T13:15:18.610Z

Reserved: 2025-10-30T02:34:37.562Z

Link: CVE-2025-46413

cve-icon Vulnrichment

Updated: 2025-11-07T13:15:07.026Z

cve-icon NVD

Status : Deferred

Published: 2025-11-07T09:15:38.787

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-46413

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-10T09:34:49Z

Weaknesses