Show filters
138 Total Results
Displaying 111-120 of 138
Sort by:
Attacker Value
Unknown

CVE-2022-34045

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.
Attacker Value
Unknown

CVE-2022-2488

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2022-2487

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2022-2486

Disclosure Date: July 20, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.
Attacker Value
Unknown

CVE-2022-34592

Disclosure Date: July 07, 2022 (last updated February 24, 2025)
Wavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request.
Attacker Value
Unknown

CVE-2022-40621

Disclosure Date: July 05, 2022 (last updated February 24, 2025)
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
Attacker Value
Unknown

CVE-2022-31847

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.
Attacker Value
Unknown

CVE-2022-31846

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability in live_mfg.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.
Attacker Value
Unknown

CVE-2022-31845

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
A vulnerability in live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.
Attacker Value
Unknown

CVE-2022-31311

Disclosure Date: June 14, 2022 (last updated February 23, 2025)
An issue in adm.cgi of WAVLINK AERIAL X 1200M M79X3.V5030.180719 allows attackers to execute arbitrary commands via a crafted POST request.