First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
WAVLINK WN531P3 | ||
WAVLINK WN531P3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-35517.
The severity of CVE-2022-35517 is high with a severity value of 8.8.
The following WAVLINK router models are affected by CVE-2022-35517: WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3.
CVE-2022-35517 is a command injection vulnerability in the adm.cgi page of WAVLINK routers where certain parameters are not filtered, leading to potential command injection.
At the time of writing, there is no official fix available for CVE-2022-35517. It is recommended to follow security best practices such as ensuring the router firmware is up to date, using strong passwords, and restricting remote access.