First published: Wed Jul 20 2022(Updated: )
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn535k2 Firmware | ||
Wavlink Wl-wn535k2 | ||
Wavlink Wl-wn535k3 Firmware | ||
Wavlink Wl-wn535k3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-2488.
The severity of CVE-2022-2488 is critical with a severity value of 9.8.
The WAVLINK WN535K2 and WN535K3 firmware versions are affected by CVE-2022-2488.
CVE-2022-2488 allows for OS command injection, which can lead to unauthorized remote code execution.
Apply the latest firmware updates provided by WAVLINK to address CVE-2022-2488.