WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.

Project Subscriptions

Vendors Products
Wavlink Subscribe
Wn530h4 Subscribe
Wn530h4 Firmware Subscribe
Wn531p3 Subscribe
Wn531p3 Firmware Subscribe
Wn533a8 Subscribe
Wn533a8 Firmware Subscribe
Wn535g3 Subscribe
Wn535g3 Firmware Subscribe
Wn572hp3 Subscribe
Wn572hp3 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-38411 WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T09:36:44.331Z

Reserved: 2022-07-11T00:00:00

Link: CVE-2022-35524

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-08-10T20:15:56.097

Modified: 2024-11-21T07:11:17.767

Link: CVE-2022-35524

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses