Lucene search

K
WavlinkWn530h4 Firmware

5 matches found

CVE
CVE
added 2024/10/27 9:15 p.m.46 views

CVE-2024-10429

A vulnerability classified as critical has been found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. Affected is the function set_ipv6 of the file internet.cgi. The manipulation of the argument IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr leads to command injection. It is possible to l...

8.6CVSS7.4AI score0.0368EPSS
CVE
CVE
added 2024/10/27 9:15 p.m.37 views

CVE-2024-10428

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The ex...

8.6CVSS7.4AI score0.0368EPSS
CVE
CVE
added 2024/10/20 8:15 a.m.36 views

CVE-2024-10194

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer over...

8.8CVSS8.8AI score0.00104EPSS
CVE
CVE
added 2022/08/10 8:15 p.m.35 views

CVE-2022-35517

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.

8.8CVSS8.9AI score0.00533EPSS
CVE
CVE
added 2020/10/02 9:15 a.m.29 views

CVE-2020-12123

CSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to remotely access router endpoints, because these endpoints do not contain CSRF tokens. If a user is authenticated in the router portal, then this attack will work.

8.1CVSS8AI score0.00136EPSS