Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29516: CWE-732 Incorrect Permission Assignment for Critical Resource in Buffalo TeraStation NAS TS5400R

0
Medium
VulnerabilityCVE-2026-29516cvecve-2026-29516cwe-732
Published: Mon Mar 16 2026 (03/16/2026, 19:07:52 UTC)
Source: CVE Database V5
Vendor/Project: Buffalo
Product: TeraStation NAS TS5400R

Description

CVE-2026-29516 is a medium-severity vulnerability affecting Buffalo TeraStation NAS TS5400R devices running firmware version 4. 02-0. 06 and earlier. It involves incorrect permission assignment (CWE-732) that allows authenticated attackers to upload and execute PHP files via the webserver. This leads to exposure of the /etc/shadow file with world-readable permissions, enabling attackers to retrieve hashed passwords for all configured accounts, including root. Exploitation requires authenticated access but no user interaction and can result in significant confidentiality compromise. No known exploits are currently reported in the wild. The vulnerability has a CVSS 4. 0 base score of 6. 9, reflecting a medium risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:01:09 UTC

Technical Analysis

Buffalo TeraStation NAS TS5400R devices running firmware version 4.02-0.06 and earlier contain a vulnerability identified as CVE-2026-29516, classified under CWE-732 (Incorrect Permission Assignment for Critical Resource). The flaw arises from excessive file permissions on the /etc/shadow file, which stores hashed passwords for all system accounts, including the root user. An authenticated attacker can upload a malicious PHP script through the device's webserver interface and execute it, leveraging the improper permissions to read the /etc/shadow file. This exposure allows the attacker to obtain hashed password data, which can be subjected to offline cracking attempts to recover plaintext credentials. The vulnerability requires the attacker to have valid authentication credentials but does not require any user interaction beyond that. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H means high privileges required, but here it is authenticated), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. No patches or exploits are currently publicly available, but the risk remains significant due to the sensitive nature of the exposed data and the potential for lateral movement or full system compromise if credentials are cracked.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality through unauthorized disclosure of hashed passwords, including the root account. If attackers successfully crack these hashes, they can gain full administrative control over the affected NAS device, leading to data theft, data manipulation, or disruption of services. Organizations relying on Buffalo TeraStation NAS TS5400R for critical storage may face significant operational and reputational damage. The breach of root credentials could also facilitate further attacks within the network, such as lateral movement or deployment of ransomware. Since the vulnerability requires authenticated access, insider threats or compromised credentials pose a direct risk. The lack of current public exploits reduces immediate widespread impact but does not eliminate the threat, especially in targeted attacks against organizations using these devices.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if their Buffalo TeraStation NAS TS5400R devices are running affected firmware versions (4.02-0.06 or earlier). Since no official patches are currently available, administrators should restrict access to the webserver interface to trusted users only, ideally through network segmentation and firewall rules limiting access to management interfaces. Implement strong authentication mechanisms and enforce strict password policies to reduce the risk of credential compromise. Disable or restrict the ability to upload and execute PHP or other scripts via the web interface if possible. Monitor device logs for suspicious upload or execution activities. Regularly audit file permissions on critical system files like /etc/shadow to ensure they are not world-readable. Finally, maintain close communication with Buffalo for firmware updates or official patches addressing this vulnerability and apply them promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-03-04T15:39:26.872Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b859da771bdb17492b2d93

Added to database: 3/16/2026, 7:28:26 PM

Last enriched: 3/24/2026, 1:01:09 AM

Last updated: 4/30/2026, 10:22:59 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses