Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wavlink vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-35523
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35524
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35525
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35526
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35534
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35538
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35521
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
NA
CVE-2022-35533
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.
Wavlink Wn572hp3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn530h4 Firmware -
Wavlink Wn535g3 Firmware -
Wavlink Wn531p3 Firmware -
5
CVSSv2
CVE-2020-10973
An issue exists in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. Th...
Wavlink Wn530hg4 Firmware M30hg4.v5030.191116
Wavlink Wn531g3 Firmware -
Wavlink Wn533a8 Firmware -
Wavlink Wn551k1 Firmware -
5
CVSSv2
CVE-2020-10972
An issue exists where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4,...
Wavlink Wn530hg4 Firmware M30hg4.v5030.191116
Wavlink Wn531g3 Firmware -
Wavlink Wn572hg3 Firmware -
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »