MEDIUM · 6.5

CVE-2024-48705

Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifical...

Vulnerability Description

Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifically found within the "set_sys_adm" function of the "adm.cgi" binary, and is due to improper santization of the user provided "newpass" field

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE

Affected Products

VendorProductVersions
WavlinkWl-Wn531P3 Firmwarem32a3_v1410_230602
WavlinkWl-Wn531P3-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2024-48705?

CVE-2024-48705 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifical...

How severe is CVE-2024-48705?

CVE-2024-48705 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2024-48705?

Check the references section above for vendor advisories and patch information. Affected products include: Wavlink Wl-Wn531P3 Firmware, Wavlink Wl-Wn531P3.