First published: Fri Jun 23 2023(Updated: )
A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wn579x3 Firmware | <=2023-06-15 | |
Wavlink WN579X3 | ||
All of | ||
Wavlink Wn579x3 Firmware | <=2023-06-15 | |
Wavlink WN579X3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3380 is a critical vulnerability found in Wavlink WN579X3 up to 20230615.
CVE-2023-3380 has a severity rating of 9.8 (critical).
CVE-2023-3380 affects an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test in Wavlink WN579X3.
Yes, CVE-2023-3380 can be exploited remotely.
Information on fixes and patches for CVE-2023-3380 can be found in the provided references.