Show filters
21 Total Results
Displaying 11-20 of 21
Sort by:
Attacker Value
Unknown

CVE-2022-35523

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.
Attacker Value
Unknown

CVE-2022-35522

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: ppp_username, ppp_passwd, rwan_gateway, rwan_mask and rwan_ip, which leads to command injection in page /wan.shtml.
Attacker Value
Unknown

CVE-2022-35521

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.
Attacker Value
Unknown

CVE-2022-35520

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 api.cgi has no filtering on parameter ufconf, and this is a hidden parameter which doesn't appear in POST body, but exist in cgi binary. This leads to command injection in page /ledonoff.shtml.
Attacker Value
Unknown

CVE-2022-35519

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter add_mac, which leads to command injection in page /cli_black_list.shtml.
Attacker Value
Unknown

CVE-2022-35518

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 nas.cgi has no filtering on parameters: User1Passwd and User1, which leads to command injection in page /nas_disk.shtml.
Attacker Value
Unknown

CVE-2022-35517

Disclosure Date: August 10, 2022 (last updated February 24, 2025)
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
Attacker Value
Unknown

CVE-2022-34048

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Wavlink WN533A8 M33A8.V5030.190716 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the login_page parameter.
Attacker Value
Unknown

CVE-2022-34046

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].
Attacker Value
Unknown

CVE-2020-10973

Disclosure Date: May 07, 2020 (last updated February 21, 2025)
An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.