CVE-2022-2487
HIGH EXPLOITED NUCLEIWavlink Wl-wn535k2 Firmware - OS Command Injection
Title source: ruleDescription
A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.
Nuclei Templates (1)
Wavlink WN535K2/WN535K3 - OS Command Injection
CRITICALVERIFIEDby For3stCo1d
Shodan:
http.title:"Wi-Fi APP Login" || http.title:"wi-fi app login"
FOFA:
title="wi-fi app login"
Scores
CVSS v3
8.0
EPSS
0.9312
EPSS Percentile
99.8%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
VulnCheck KEV
2023-11-14
CWE
CWE-78
Status
published
Products (2)
wavlink/wl-wn535k2_firmware
wavlink/wl-wn535k3_firmware
Published
Jul 20, 2022
Tracked Since
Feb 18, 2026