First published: Fri Feb 03 2023(Updated: )
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 M30H4.V5030.210121 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn530h4 Firmware | =m30h4.v5030.210121 | |
Wavlink WL-WN530H4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-48165 is high with a CVSS score of 7.5.
The affected software of CVE-2022-48165 is Wavlink WL-WN530H4 firmware version M30H4.V5030.210121.
CVE-2022-48165 is an access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 firmware version M30H4.V5030.210121 that allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.
An attacker can exploit CVE-2022-48165 by accessing the /cgi-bin/ExportLogs.sh component without authentication and downloading configuration data and log files, potentially obtaining admin credentials.
No, Wavlink WL-WN530H4 itself is not vulnerable to CVE-2022-48165, but the firmware version M30H4.V5030.210121 is vulnerable.