A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wavlink wl-wn535k2_firmware - |
||
wavlink wl-wn535k3_firmware - |