Wavlink

Wn533a8 Firmware

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:19

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: mac_5g and Newname, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: qos_bandwith and qos_dat, which leads to command injection in page /qos.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter macAddr, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:17

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:17

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:55
  • Zuletzt bearbeitet 21.11.2024 07:11:17

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.