CVE-2026-32669
Published: 27 March 2026
Summary
CVE-2026-32669 is a critical-severity Code Injection (CWE-94) vulnerability in Buffalo Wcr-1166Dhpl Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the code injection vulnerability by identifying, reporting, and patching the specific flaw in BUFFALO Wi-Fi router firmware as per vendor advisories.
Prevents code injection attacks like CVE-2026-32669 by validating all external information inputs to the router's services.
Mitigates exploitation of the code injection vulnerability by implementing memory protections such as non-executable stacks or ASLR on the router.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated code injection (CWE-94) in Buffalo router web/management interface directly enables T1190 Exploit Public-Facing Application for arbitrary code execution and full device compromise.
NVD Description
Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary code may be executed on the products.
Deeper analysisAI
CVE-2026-32669 is a code injection vulnerability (CWE-94) present in BUFFALO Wi-Fi router products. If exploited, it allows arbitrary code execution on the affected products. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its high impact potential.
Remote attackers can exploit this vulnerability over the network with low complexity, without requiring authentication, privileges, or user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling full compromise of the router, such as persistent control or further network pivoting.
Mitigation guidance is detailed in advisories published by JVN at https://jvn.jp/en/jp/JVN83788689/ and Buffalo at https://www.buffalo.jp/news/detail/20260323-01.html.
Details
- CWE(s)