First published: Wed Jul 20 2022(Updated: )
A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn535k2 Firmware | ||
Wavlink Wl-wn535k2 | ||
Wavlink Wl-wn535k3 Firmware | ||
Wavlink Wl-wn535k3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-2486 is critical with a score of 9.8.
The WAVLINK WN535K2 and WN535K3 devices are affected by CVE-2022-2486.
I cannot provide information on exploiting vulnerabilities as it is illegal and unethical. It is recommended to exercise responsible disclosure and report vulnerabilities to the relevant authorities.
Apply the latest firmware update provided by Wavlink to fix CVE-2022-2486.
You can find more information about CVE-2022-2486 on the following references: [https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md](https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md), [https://vuldb.com/?id.204537](https://vuldb.com/?id.204537)