Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-10428


A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.


Published

2024-10-27T21:15:02.333

Last Modified

2024-11-13T17:57:51.100

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 7.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:M/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: MULTIPLE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

6.4

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-77

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System wavlink wn530h4_firmware 20220721 Yes
Hardware wavlink wn530h4 - No
Operating System wavlink wn530hg4_firmware 20220809 Yes
Hardware wavlink wn530hg4 - No
Operating System wavlink wn572hg3_firmware 20221028 Yes
Hardware wavlink wn572hg3 - No

References