First published: Sun Oct 27 2024(Updated: )
A vulnerability classified as critical has been found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. Affected is the function set_ipv6 of the file internet.cgi. The manipulation of the argument IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Wavlink Wn530h4 Firmware | =20220721 | |
Wavlink WN530H4 | ||
All of | ||
Wavlink Wn530hg4 Firmware | =20220809 | |
Wavlink WN530HG4 | ||
All of | ||
Wavlink Wn572hg3 Firmware | =20221028 | |
Wavlink WN572HG3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10429 is classified as a critical vulnerability.
To fix CVE-2024-10429, update the affected WAVLINK devices to the firmware versions released after October 28, 2022.
CVE-2024-10429 affects WAVLINK models WN530H4, WN530HG4, and WN572HG3 with specific firmware versions.
CVE-2024-10429 is a command injection vulnerability found in the set_ipv6 function of the internet.cgi file.
The exploitation of CVE-2024-10429 can lead to unauthorized command execution on the affected WAVLINK devices.