Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wavlink vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2023-29708
An issue exists in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows malicious users to force a factory reset via crafted payload.
Wavlink Wavrouter App Rpt70ha1.x
7.5
CVSSv3
CVE-2022-48166
An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.201217
7.5
CVSSv3
CVE-2022-48164
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN533A8 M33A8.V5030.190716 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn533a8 Firmware M33a8.v5030.190716
7.5
CVSSv3
CVE-2022-48165
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 M30H4.V5030.210121 allows unauthenticated malicious users to download configuration data and log files and obtain admin credentials.
Wavlink Wl-wn530h4 Firmware M30h4.v5030.210121
7.5
CVSSv3
CVE-2022-44356
WAVLINK Quantum D4G (WL-WN531G3) running firmware versions M31G3.V5030.201204 and M31G3.V5030.200325 has an access control issue which allows unauthenticated malicious users to download configuration data and log files.
Wavlink Wl-wn531g3 Firmware M31g3.v5030.200325
Wavlink Wl-wn531g3 Firmware M31g3.v5030.201204
7.5
CVSSv3
CVE-2022-40621
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and previous versions communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network acces...
Wavlink Wn531g3 Firmware
7.5
CVSSv3
CVE-2022-34576
A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN535 G3 M35G3R.V5030.180927 allows malicious users to execute arbitrary code via a crafted POST request.
Wavlink Wn535g3 Firmware M35g3r.v5030.180927
7.5
CVSSv3
CVE-2022-34570
WAVLINK WN579 X3 M79X3.V5030.191012/M79X3.V5030.191012 contains an information leak which allows malicious users to obtain the key information via accessing the messages.txt page.
Wavlink Wl-wn579x3 Firmware M79x3.v5030.191012
7.5
CVSSv3
CVE-2022-34046
An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows malicious users to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].
Wavlink Wn533a8 Firmware M33a8.v5030.190716
7.5
CVSSv3
CVE-2022-34047
An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows malicious users to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].
Wavlink Wl-wn530hg4 Firmware M30hg4.v5030.191116
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »