First published: Thu Jun 22 2023(Updated: )
An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
=rpt70ha1.x | ||
=rpt70ha1.x | ||
Wavlink Wavrouter App | =rpt70ha1.x | |
Wavlink Wavrouter App | =rpt70ha1.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-29708.
The severity of CVE-2023-29708 is high with a severity score of 7.5.
The affected software version is WavLink WavRouter version RPT70HA1.x.
Attackers can exploit CVE-2023-29708 by forcing a factory reset using a crafted payload.
Currently, there is no known fix for CVE-2023-29708. It is recommended to apply any patches or updates provided by the vendor.