Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wavlink vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-34592
Wavlink WL-WN575A3 RPT75A3.V4300.201217 exists to contain a command injection vulnerability via the function obtw. This vulnerability allows malicious users to execute arbitrary commands via a crafted POST request.
Wavlink Wl-wn575a3 Firmware Rpt75a3.v4300.201217
7.5
CVSSv3
CVE-2022-48164
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN533A8 M33A8.V5030.190716 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn533a8 Firmware M33a8.v5030.190716
7.5
CVSSv3
CVE-2022-48165
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 M30H4.V5030.210121 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn530h4 Firmware M30h4.v5030.210121
9.8
CVSSv3
CVE-2022-23900
A command injection vulnerability in the API of the Wavlink WL-WN531P3 router, version M31G3.V5030.201204, allows an malicious user to achieve unauthorized remote code execution via a malicious POST request through /cgi-bin/adm.cgi.
Wavlink Wl-wn531p3 Firmware M31g3.v5030.201204
7.5
CVSSv3
CVE-2022-48166
An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.201217
9.8
CVSSv3
CVE-2021-44259
A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this devic...
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
7.5
CVSSv3
CVE-2021-44260
A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote malicious user to access this page without any authentication. When processed, it exposes some key information of the manager of router.
Wavlink Wl-wn531g3 Firmware A42w-1.27.6-20180418
5.7
CVSSv3
CVE-2022-34574
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the key information of the device via accessing Tftpd32.ini.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
8
CVSSv3
CVE-2022-34571
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
5.7
CVSSv3
CVE-2022-34572
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows malicious users to obtain the telnet password via accessing the page tftp.txt.
Wavlink Wifi-repeater Firmware Rpta2-77w.m4300.01.gd.2017sep19
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »