First published: Wed Aug 10 2022(Updated: )
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn572hp3 Firmware | ||
WAVLINK WN572HP3 | ||
Wavlink Wn533a8 Firmware | ||
Wavlink WN533A8 | ||
Wavlink Wn530h4 Firmware | ||
Wavlink WN530H4 | ||
Wavlink Wn535g3 Firmware | ||
Wavlink WN535G3 | ||
Wavlink Wn531p3 Firmware | ||
Wavlink Wn531p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35538 is a vulnerability in the WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, and WN531P3 routers, where the wireless.cgi page lacks parameter filtering, leading to command injection in the /wifi_mesh.shtml page.
CVE-2022-35538 has a severity score of 9.8 (critical).
The Wavlink Wn572hp3, Wn533a8, Wn530h4, Wn535g3, and Wn531p3 routers with their respective firmware versions are affected.
CVE-2022-35538 is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')).
To fix CVE-2022-35538, update your Wavlink router firmware to a version that includes the necessary filtering on parameters.