First published: Wed Jul 20 2022(Updated: )
A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn535k2 Firmware | ||
Wavlink Wl-wn535k2 | ||
Wavlink Wl-wn535k3 Firmware | ||
Wavlink Wl-wn535k3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-2487 is critical with a CVSS score of 9.8.
The affected software of CVE-2022-2487 includes WAVLINK WN535K2 and WN535K3 devices with specific firmware versions.
CVE-2022-2487 is a critical vulnerability that allows for OS command injection through the manipulation of the 'start_hour' argument in the '/cgi-bin/nightled.cgi' file.
The CVE-2022-2487 vulnerability can be exploited by an attacker who has access to the targeted device's network and can manipulate the 'start_hour' argument in the '/cgi-bin/nightled.cgi' file to inject malicious OS commands.
At the moment, there are no known fixes or patches for CVE-2022-2487. It is recommended to contact WAVLINK for further information and updates.