Lucene search

K
nvd[email protected]NVD:CVE-2022-35521
HistoryAug 10, 2022 - 8:15 p.m.

CVE-2022-35521

2022-08-1020:15:55
web.nvd.nist.gov
wavlink firewall page command injection

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.021 Low

EPSS

Percentile

89.3%

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.

Affected configurations

NVD
Node
wavlinkwn572hp3_firmwareMatch-
AND
wavlinkwn572hp3Match-
Node
wavlinkwn533a8_firmwareMatch-
AND
wavlinkwn533a8Match-
Node
wavlinkwn530h4_firmwareMatch-
AND
wavlinkwn530h4Match-
Node
wavlinkwn535g3_firmwareMatch-
AND
wavlinkwn535g3Match-
Node
wavlinkwn531p3_firmwareMatch-
AND
wavlinkwn531p3Match-

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.021 Low

EPSS

Percentile

89.3%

Related for NVD:CVE-2022-35521