First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 nas.cgi has no filtering on parameters: User1Passwd and User1, which leads to command injection in page /nas_disk.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
Wavlink Wn531p3 Firmware | ||
Wavlink Wn531p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-35518 is critical, with a severity value of 9.8.
The affected software for CVE-2022-35518 includes WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3.
The vulnerability in WAVLINK routers is a command injection in page /nas_disk.shtml, caused by the lack of filtering on parameters User1Passwd and User1 in nas.cgi.
To fix CVE-2022-35518, it is recommended to update the firmware of the affected WAVLINK routers to a version that includes the necessary security patches.
More information about CVE-2022-35518 can be found at the following reference: [Link](https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-nas_diskshtml-command-injection-in-nascgi)