Description
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-router-ac1200-page-wizard_router_meshshtml-command-injection-in-admcgi
Scores
CVSS v3
8.8
EPSS
0.0490
EPSS Percentile
89.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
Status
published
Products (5)
wavlink/wn530h4_firmware
wavlink/wn531p3_firmware
wavlink/wn533a8_firmware
wavlink/wn535g3_firmware
wavlink/wn572hp3_firmware
Published
Aug 10, 2022
Tracked Since
Feb 18, 2026