First published: Tue Aug 02 2022(Updated: )
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.
Credit: cve@rapid7.con
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn531g3 Firmware | <=m31g3.v5030.200325 | |
Wavlink WN531G3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40622 is a vulnerability found in the WAVLINK Quantum D4G (WN531G3) router firmware that allows an attacker to gain unauthorized access to the router by changing their IP address to match the logged-in administrator's or being behind the same NAT.
CVE-2022-40622 has a severity score of 8.8, classified as high severity.
CVE-2022-40622 affects the WAVLINK Quantum D4G (WN531G3) firmware version M31G3.V5030.200325, making it vulnerable to unauthorized access.
An attacker can exploit CVE-2022-40622 by changing their IP address to match the logged-in administrator's or by being behind the same NAT.
No, the WAVLINK WN531G3 router is not vulnerable to CVE-2022-40622.