Lucene search

K
WavlinkWn530h4 Firmware

4 matches found

CVE
CVE
added 2020/10/02 9:15 a.m.48 views

CVE-2020-12127

An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.

7.5CVSS7AI score0.19684EPSS
CVE
CVE
added 2020/05/07 6:15 p.m.42 views

CVE-2020-10974

An issue was discovered affecting a backup feature where a crafted POST request returns the current configuration of the device in cleartext, including the administrator password. No authentication is required. Affected devices: Wavlink WN575A3, Wavlink WN579G3, Wavlink WN531A6, Wavlink WN535G3, Wa...

7.5CVSS7.5AI score0.0034EPSS
CVE
CVE
added 2020/04/27 3:15 p.m.38 views

CVE-2020-12266

An issue was discovered where there are multiple externally accessible pages that do not require any sort of authentication, and store system information for internal usage. The devices automatically query these pages to update dashboards and other statistics, but the pages can be accessed external...

7.5CVSS8.6AI score0.00423EPSS
CVE
CVE
added 2024/10/20 8:15 a.m.36 views

CVE-2024-10193

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file internet.cgi. The manipulation of the argument DDNS leads to command injection. The attack may be initiated remotely. The exploit has ...

7.2CVSS5.6AI score0.02708EPSS