First published: Fri Jun 30 2023(Updated: )
Client-side enforcement of server-side security issue exists in WL-WN531AX2 firmware versions prior to 2023526, which may allow an attacker with an administrative privilege to execute OS commands with the root privilege.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn531ax2 Firmware | <2023526 | |
Wavlink Wl-wn531ax2 | ||
All of | ||
Wavlink Wl-wn531ax2 Firmware | <2023526 | |
Wavlink Wl-wn531ax2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32612 is high with a severity value of 7.2.
The affected software of CVE-2023-32612 is Wavlink Wl-wn531ax2 firmware versions prior to 2023526.
An attacker with administrative privilege can exploit CVE-2023-32612 to execute OS commands with root privilege.
No, Wavlink Wl-wn531ax2 firmware version 2023526 is not vulnerable to CVE-2023-32612.
You can find more information about CVE-2023-32612 at the following references: [link1](https://jvn.jp/en/jp/JVN78634340/), [link2](https://www.wavlink.com/en_us/firmware/details/932108ffc5.html).