First published: Mon Jun 24 2024(Updated: )
WAVLINK WN551K1 found a command injection vulnerability through the start_hour parameter of /cgi-bin/nightled.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink WN551K1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38896 has been classified as a high severity vulnerability due to its command injection potential.
To mitigate CVE-2024-38896, ensure that the firmware for the WAVLINK WN551K1 is updated to the latest version that addresses this vulnerability.
CVE-2024-38896 specifically affects the WAVLINK WN551K1 device.
CVE-2024-38896 can be exploited through command injection by manipulating the start_hour parameter in the /cgi-bin/nightled.cgi endpoint.
CVE-2024-38896 can be easily exploited by attackers with low skill who can send crafted requests to the affected endpoint.