First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
Wavlink Wn531p3 Firmware | ||
Wavlink Wn531p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35534 is a vulnerability found in WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, and WN531P3 routers that allows command injection.
CVE-2022-35534 has a severity rating of 9.8 out of 10.
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, and WN531P3 routers are affected by CVE-2022-35534.
The CVE-2022-35534 vulnerability can be exploited through command injection in the /wifi_multi_ssid.shtml page of the router.
At the moment, there is no information available about a fix for CVE-2022-35534. It is recommended to apply any security updates provided by the vendor and monitor for further updates.