First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
Wavlink Wn531p3 Firmware | ||
Wavlink Wn531p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-35523.
The title of this vulnerability is 'WAVLINK WN572HP3 WN533A8 WN530H4 WN535G3 WN531P3 firewall.cgi has no filtering on parameter del_mac ...'.
The severity of CVE-2022-35523 is rated as critical with a severity value of 9.8.
The WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 devices with their respective firmware versions are affected by this vulnerability.
The CWE category associated with this vulnerability is CWE-77.
The vulnerability is manifested as a command injection in the page /cli_black_list.shtml, which can lead to unauthorized execution of commands and potentially compromise the affected device's security.
At the moment, there is no information available regarding a patch or fix for this vulnerability. It is recommended to follow the provided reference for any updates or mitigation steps.
You can find more information about this vulnerability in the reference provided: [https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi](https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#command-injection-occurs-when-adding-blacklist-in-wavlink-router-ac1200-page-cli_black_listshtml-in-firewallcgi)