Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wavlink vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2022-23900
A command injection vulnerability in the API of the Wavlink WL-WN531P3 router, version M31G3.V5030.201204, allows an malicious user to achieve unauthorized remote code execution via a malicious POST request through /cgi-bin/adm.cgi.
Wavlink Wl-wn531p3 Firmware M31g3.v5030.201204
NA
CVE-2023-29708
An issue exists in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows malicious users to force a factory reset via crafted payload.
Wavlink Wavrouter App Rpt70ha1.x
NA
CVE-2022-34045
Wavlink WN530HG4 M30HG4.V5030.191116 exists to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.191116
NA
CVE-2022-34047
An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows malicious users to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.191116
NA
CVE-2022-34570
WAVLINK WN579 X3 M79X3.V5030.191012/M79X3.V5030.191012 contains an information leak which allows malicious users to obtain the key information via accessing the messages.txt page.
Wavlink Wl-wn579x3 Firmware M79x3.v5030.191012
7.5
CVSSv2
CVE-2021-44259
A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this devic...
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
5
CVSSv2
CVE-2021-44260
A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When processed, it exposes some key information of the manager of router.
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
NA
CVE-2022-34572
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the telnet password via accessing the page tftp.txt.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
NA
CVE-2022-34575
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the key information of the device via accessing fctest.shtml.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
NA
CVE-2022-34571
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »