First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
Wavlink Wn531p3 Firmware | ||
Wavlink Wn531p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35524 is a vulnerability found in WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, and WN531P3 routers, specifically in the adm.cgi page, which allows for command injection.
CVE-2022-35524 has a severity rating of 9.8 (critical).
WAVLINK WN572HP3 Firmware, WAVLINK WN533A8 Firmware, WAVLINK WN530H4 Firmware, WAVLINK WN535G3 Firmware, and WAVLINK WN531P3 Firmware are affected by CVE-2022-35524.
Currently, there is no known fix for CVE-2022-35524. It is recommended to contact the vendor for further assistance.
More information about CVE-2022-35524 can be found at the following link: [link](https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_repshtml-command-injection-in-admcgi)