Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wavlink vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2022-34592
Wavlink WL-WN575A3 RPT75A3.V4300.201217 exists to contain a command injection vulnerability via the function obtw. This vulnerability allows malicious users to execute arbitrary commands via a crafted POST request.
Wavlink Wl-wn575a3 Firmware Rpt75a3.v4300.201217
7.5
CVSSv2
CVE-2022-23900
A command injection vulnerability in the API of the Wavlink WL-WN531P3 router, version M31G3.V5030.201204, allows an malicious user to achieve unauthorized remote code execution via a malicious POST request through /cgi-bin/adm.cgi.
Wavlink Wl-wn531p3 Firmware M31g3.v5030.201204
NA
CVE-2022-37149
WAVLINK WL-WN575A3 RPT75A3.V4300.201217 exists to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows malicious users to execute arbitrary commands via the username parameter.
Wavlink Wl-wn575a3 Firmware Rpt75a3.v4300.201217
10
CVSSv2
CVE-2020-15490
An issue exists on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple buffer overflow vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges. (The set of affected scripts is similar to CVE-2020-12266.)
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.191116
10
CVSSv2
CVE-2020-15489
An issue exists on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.191116
7.5
CVSSv2
CVE-2021-44259
A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this devic...
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
5
CVSSv2
CVE-2021-44260
A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When processed, it exposes some key information of the manager of router.
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
NA
CVE-2022-34571
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
NA
CVE-2022-34572
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the telnet password via accessing the page tftp.txt.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
NA
CVE-2022-34573
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »