First published: Fri Oct 02 2020(Updated: )
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn530h4 Firmware | =m30h4.v5030.190403 | |
Wavlink WN530H4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12124 is a remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 router.
CVE-2020-12124 has a severity rating of 9.8 (Critical).
CVE-2020-12124 allows an attacker to execute arbitrary Linux commands as root without authentication by exploiting a remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 router.
If you are using the WAVLINK WN530H4 M30H4.V5030.190403 firmware, your router is affected by CVE-2020-12124.
To fix CVE-2020-12124, it is recommended to update your WAVLINK WN530H4 router firmware to a version that has addressed the vulnerability.