WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
2022-08-10T20:15:54.587
2024-11-21T07:11:16.683
Modified
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | wavlink | wn572hp3_firmware | - | Yes |
| Hardware | wavlink | wn572hp3 | - | No |
| Operating System | wavlink | wn533a8_firmware | - | Yes |
| Hardware | wavlink | wn533a8 | - | No |
| Operating System | wavlink | wn530h4_firmware | - | Yes |
| Hardware | wavlink | wn530h4 | - | No |
| Operating System | wavlink | wn535g3_firmware | - | Yes |
| Hardware | wavlink | wn535g3 | - | No |
| Operating System | wavlink | wn531p3_firmware | - | Yes |
| Hardware | wavlink | wn531p3 | - | No |