Vulnerability Description
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wavlink | Wn572Hp3 Firmware | - |
| Wavlink | Wn572Hp3 | - |
| Wavlink | Wn533A8 Firmware | - |
| Wavlink | Wn533A8 | - |
| Wavlink | Wn530H4 Firmware | - |
| Wavlink | Wn530H4 | - |
| Wavlink | Wn535G3 Firmware | - |
| Wavlink | Wn535G3 | - |
| Wavlink | Wn531P3 Firmware | - |
| Wavlink | Wn531P3 | - |
References
- https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-routExploitThird Party Advisory
- https://github.com/TyeYeah/othercveinfo/blob/main/wavlink/README.md#wavlink-routExploitThird Party Advisory
FAQ
What is CVE-2022-35517?
CVE-2022-35517 is a vulnerability with a CVSS score of 8.8 (HIGH). WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd ...
How severe is CVE-2022-35517?
CVE-2022-35517 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-35517?
Check the references section above for vendor advisories and patch information. Affected products include: Wavlink Wn572Hp3 Firmware, Wavlink Wn572Hp3, Wavlink Wn533A8 Firmware, Wavlink Wn533A8, Wavlink Wn530H4 Firmware.