First published: Fri Jun 30 2023(Updated: )
Improper neutralization of special elements in WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to execute OS commands with the root privilege.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wl-wn531ax2 Firmware | <2023526 | |
Wavlink Wl-wn531ax2 | ||
All of | ||
Wavlink Wl-wn531ax2 Firmware | <2023526 | |
Wavlink Wl-wn531ax2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-32622.
The severity level of CVE-2023-32622 is high (7.2).
The affected software for CVE-2023-32622 is Wavlink Wl-wn531ax2 firmware versions prior to 2023526.
An attacker with administrative privilege can exploit CVE-2023-32622 by executing OS commands with root privilege.
Yes, you can find references for CVE-2023-32622 at the following links: [JVN](https://jvn.jp/en/jp/JVN78634340/) and [Wavlink](https://www.wavlink.com/en_us/firmware/details/932108ffc5.html).