WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wavlink wn572hp3_firmware - |
||
wavlink wn533a8_firmware - |
||
wavlink wn530h4_firmware - |
||
wavlink wn535g3_firmware - |
||
wavlink wn531p3_firmware - |