First published: Fri Oct 02 2020(Updated: )
Multiple authentication bypass vulnerabilities in the /cgi-bin/ endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to leak router settings, change configuration variables, and cause denial of service via an unauthenticated endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn530h4 Firmware | =m30h4.v5030.190403 | |
Wavlink WN530H4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12126 is a vulnerability in the /cgi-bin/ endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 that allows an attacker to bypass authentication and gain unauthorized access.
CVE-2020-12126 has a severity rating of 9.8 out of 10, making it a critical vulnerability.
The affected software/version for CVE-2020-12126 is the Wavlink WN530H4 M30H4.V5030.190403.
An attacker can exploit CVE-2020-12126 by bypassing authentication in the /cgi-bin/ endpoint and gain unauthorized access to leak router settings, change configuration variables, and cause denial of service.
No, only the Wavlink WN530H4 M30H4.V5030.190403 firmware version is affected by CVE-2020-12126.