EUVD-2025-209534

| CVE-2025-66954 MEDIUM
2026-04-20 mitre GHSA-3gjh-jvm6-6pfg
6.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

1
Analysis Generated
Apr 20, 2026 - 17:51 vuln.today

DescriptionNVD

A vulnerability exists in the Buffalo Link Station version 1.85-0.01 that allows unauthenticated or guest-level users to enumerate valid usernames and their associated privilege roles. The issue is triggered by modifying a parameter within requests sent to the /nasapi endpoint.

AnalysisAI

Buffalo Link Station version 1.85-0.01 allows privilege escalation through username and role enumeration via parameter manipulation at the /nasapi endpoint. Authenticated or guest-level users can identify valid usernames and their associated privilege roles by modifying request parameters, enabling targeted privilege escalation attacks. While CVSS indicates a network vector, actual exploitation requires prior authentication or guest access, limiting immediate exposure but creating a stepping stone for further attacks.

Technical ContextAI

The vulnerability exists in the /nasapi endpoint of Buffalo Link Station, a network-attached storage (NAS) device management interface. The endpoint fails to properly validate or restrict access to user enumeration functionality when request parameters are modified. The root cause is insufficient access control on information disclosure endpoints - an authenticated or guest user can infer the existence and privilege levels of other system accounts without authorization. This is a classic information disclosure vulnerability (CWE category: improper access control leading to information exposure) that transforms user enumeration into privilege mapping, which significantly reduces the complexity of launching targeted privilege escalation or lateral movement attacks within the NAS environment.

RemediationAI

Apply the firmware patch to Buffalo Link Station to version later than 1.85-0.01 as released by Buffalo (specific patch version not confirmed in provided data - verify via Buffalo official advisory). If immediate patching is unavailable, implement network-level mitigations: restrict access to the NAS management interface to trusted internal networks only using firewall rules, disable guest-level access if not required for legitimate operations, and monitor /nasapi endpoint requests for parameter manipulation patterns (log all requests with modified parameters and alert on unusual enumeration activity). If the NAS must be remotely accessible, place it behind a VPN gateway requiring additional authentication before reaching the management interface. These controls reduce the likelihood that attackers can reach the vulnerable endpoint and enumerate users. Verify patch availability directly from Buffalo's support portal or security advisories.

Share

EUVD-2025-209534 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy