Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46413: Use of password hash with insufficient computational effort in BUFFALO INC. WSR-1800AX4

0
Medium
VulnerabilityCVE-2025-46413cvecve-2025-46413
Published: Fri Nov 07 2025 (11/07/2025, 08:51:52 UTC)
Source: CVE Database V5
Vendor/Project: BUFFALO INC.
Product: WSR-1800AX4

Description

Use of password hash with insufficient computational effort issue exists in BUFFALO Wi-Fi router 'WSR-1800AX4 series'. When WPS is enabled, PIN code and/or Wi-Fi password may be obtained by an attacker.

AI-Powered Analysis

AILast updated: 11/07/2025, 09:22:57 UTC

Technical Analysis

The vulnerability CVE-2025-46413 affects the BUFFALO WSR-1800AX4 series Wi-Fi routers, specifically versions prior to 1.09. The root cause is the use of password hashing algorithms that do not apply sufficient computational effort, weakening the protection of stored credentials related to WPS functionality. WPS is a feature designed to simplify the process of connecting devices to a Wi-Fi network using a PIN or push-button method. However, in this case, the insufficiently hardened password hash allows an attacker to perform offline or online attacks to recover the WPS PIN or Wi-Fi password without requiring any privileges or user interaction. The vulnerability is network exploitable remotely, as it requires only access to the wireless interface with WPS enabled. The CVSS vector (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) indicates that the attack can be performed over the network with low attack complexity, no privileges, and no user interaction, resulting in limited confidentiality impact but no integrity or availability impact. No known exploits have been reported yet, but the weakness could facilitate unauthorized access to the wireless network, potentially enabling attackers to intercept traffic or pivot into internal systems. The vulnerability was published on November 7, 2025, and BUFFALO has released firmware version 1.09 to address the issue, though patch links are not provided in the source data.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to corporate Wi-Fi networks, especially in environments where the affected BUFFALO WSR-1800AX4 routers are deployed with WPS enabled. This unauthorized access could allow attackers to intercept sensitive communications, access internal resources, or launch further attacks within the network. While the vulnerability does not directly impact data integrity or availability, the confidentiality breach could expose sensitive business information or credentials. Organizations in sectors with high security requirements, such as finance, healthcare, and government, could face increased risks. Additionally, the ease of exploitation without authentication or user interaction increases the threat level in public or semi-public Wi-Fi deployments. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations using BUFFALO WSR-1800AX4 routers should urgently verify their firmware version and upgrade to version 1.09 or later, which addresses this vulnerability. If immediate patching is not feasible, disabling WPS functionality on the routers is strongly recommended to prevent exploitation. Network administrators should also monitor wireless network access logs for unusual connection attempts or unknown devices. Implementing network segmentation to isolate Wi-Fi networks from critical internal systems can limit potential lateral movement if unauthorized access occurs. Additionally, organizations should enforce strong Wi-Fi passwords and consider disabling legacy or insecure wireless protocols. Regular vulnerability assessments and penetration testing focusing on wireless infrastructure can help identify residual risks. Finally, educating staff about the risks of WPS and encouraging secure Wi-Fi practices will enhance overall security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-10-30T02:34:37.562Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 690db7deafb341dfebb2fe72

Added to database: 11/7/2025, 9:11:58 AM

Last enriched: 11/7/2025, 9:22:57 AM

Last updated: 11/7/2025, 3:40:59 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats