First published: Tue Aug 30 2022(Updated: )
WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn575a3 Firmware | =rpt75a3.v4300.201217 | |
Wavlink WL-WN575A3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this WAVLINK WL-WN575A3 firmware version is CVE-2022-37149.
The severity of CVE-2022-37149 is critical with a severity value of 9.8.
CVE-2022-37149 is a command injection vulnerability in the WAVLINK WL-WN575A3 firmware version RPT75A3.V4300.201217, specifically in the file adm.cgi. Attackers can exploit this vulnerability to execute arbitrary commands by manipulating the username parameter.
The WAVLINK WL-WN575A3 firmware version RPT75A3.V4300.201217 is affected by CVE-2022-37149.
There is currently no official fix or patch available for CVE-2022-37149. It is recommended to update to a newer, patched version of the firmware when it becomes available.