Wavlink

Wn531p3 Firmware

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.22%
  • Veröffentlicht 06.12.2024 16:15:22
  • Zuletzt bearbeitet 03.10.2025 00:51:36

WAVLINK WN531P3 202383 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:19

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: mac_5g and Newname, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: qos_bandwith and qos_dat, which leads to command injection in page /qos.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter macAddr, which leads to command injection in page /wifi_mesh.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:57
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:17

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.

Exploit
  • EPSS 1.93%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:18

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.

Exploit
  • EPSS 5.2%
  • Veröffentlicht 10.08.2022 20:15:56
  • Zuletzt bearbeitet 21.11.2024 07:11:17

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.