CVE-2020-12124
CRITICAL EXPLOITED NUCLEIWavlink Wn530h4 Firmware - OS Command Injection
Title source: ruleDescription
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
Exploits (2)
nomisec
WORKING POC
by Scorpion-Security-Labs · remote
https://github.com/Scorpion-Security-Labs/CVE-2020-12124
Nuclei Templates (1)
WAVLINK WN530H4 live_api.cgi - Command Injection
CRITICALby DhiyaneshDK
Shodan:
http.html:"wavlink"
FOFA:
body="wavlink"
Scores
CVSS v3
9.8
EPSS
0.9229
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-03-30
CWE
CWE-78
Status
published
Products (1)
wavlink/wn530h4_firmware
m30h4.v5030.190403
Published
Oct 02, 2020
Tracked Since
Feb 18, 2026