Vulnerability Description
A vulnerability in live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wavlink | Wn535G3 Firmware | m35g3r.v5030.180927 |
| Wavlink | Wn535G3 | - |
Related Weaknesses (CWE)
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30489Not Applicable
- https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_ExploitThird Party Advisory
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30489Not Applicable
- https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20WN535%20G3__check_ExploitThird Party Advisory
FAQ
What is CVE-2022-31845?
CVE-2022-31845 is a vulnerability with a CVSS score of 7.5 (HIGH). A vulnerability in live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.
How severe is CVE-2022-31845?
CVE-2022-31845 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-31845?
Check the references section above for vendor advisories and patch information. Affected products include: Wavlink Wn535G3 Firmware, Wavlink Wn535G3.