wavlink CVE Vulnerabilities & Metrics

Focus on wavlink vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About wavlink Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with wavlink. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total wavlink CVEs: 76
Earliest CVE date: 27 Apr 2020, 15:15 UTC
Latest CVE date: 27 Oct 2024, 21:15 UTC

Latest CVE reference: CVE-2024-10429

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 4

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -50.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical wavlink CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.67

Max CVSS: 10.0

Critical CVEs (≥9): 7

CVSS Range vs. Count

Range Count
0.0-3.9 47
4.0-6.9 14
7.0-8.9 8
9.0-10.0 7

CVSS Distribution Chart

Top 5 Highest CVSS wavlink CVEs

These are the five CVEs with the highest CVSS scores for wavlink, sorted by severity first and recency.

All CVEs for wavlink

CVE-2024-10429 wavlink vulnerability CVSS: 8.3 27 Oct 2024, 21:15 UTC

A vulnerability classified as critical has been found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. Affected is the function set_ipv6 of the file internet.cgi. The manipulation of the argument IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2024-10428 wavlink vulnerability CVSS: 8.3 27 Oct 2024, 21:15 UTC

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2024-10194 wavlink vulnerability CVSS: 8.3 20 Oct 2024, 08:15 UTC

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2024-10193 wavlink vulnerability CVSS: 5.8 20 Oct 2024, 08:15 UTC

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file internet.cgi. The manipulation of the argument DDNS leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-38861 wavlink vulnerability CVSS: 0 15 Aug 2023, 19:15 UTC

An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi.

CVE-2023-32622 wavlink vulnerability CVSS: 0 30 Jun 2023, 05:15 UTC

Improper neutralization of special elements in WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to execute OS commands with the root privilege.

CVE-2023-32621 wavlink vulnerability CVSS: 0 30 Jun 2023, 05:15 UTC

WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to upload arbitrary files and execute OS commands with the root privilege.

CVE-2023-32620 wavlink vulnerability CVSS: 0 30 Jun 2023, 05:15 UTC

Improper authentication vulnerability in WL-WN531AX2 firmware versions prior to 2023526 allows a network-adjacent attacker to obtain a password for the wireless network.

CVE-2023-32613 wavlink vulnerability CVSS: 0 30 Jun 2023, 05:15 UTC

Exposure of resource to wrong sphere issue exists in WL-WN531AX2 firmware versions prior to 2023526, which may allow a network-adjacent attacker to use functions originally available after login without logging in.

CVE-2023-32612 wavlink vulnerability CVSS: 0 30 Jun 2023, 05:15 UTC

Client-side enforcement of server-side security issue exists in WL-WN531AX2 firmware versions prior to 2023526, which may allow an attacker with an administrative privilege to execute OS commands with the root privilege.

CVE-2023-3380 wavlink vulnerability CVSS: 5.8 23 Jun 2023, 10:15 UTC

A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVE-2023-29708 wavlink vulnerability CVSS: 0 22 Jun 2023, 11:15 UTC

An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.

CVE-2022-48166 wavlink vulnerability CVSS: 0 06 Feb 2023, 22:15 UTC

An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.

CVE-2022-48164 wavlink vulnerability CVSS: 0 06 Feb 2023, 14:15 UTC

An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN533A8 M33A8.V5030.190716 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.

CVE-2022-48165 wavlink vulnerability CVSS: 0 03 Feb 2023, 21:15 UTC

An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN530H4 M30H4.V5030.210121 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.

CVE-2022-44356 wavlink vulnerability CVSS: 0 29 Nov 2022, 17:15 UTC

WAVLINK Quantum D4G (WL-WN531G3) running firmware versions M31G3.V5030.201204 and M31G3.V5030.200325 has an access control issue which allows unauthenticated attackers to download configuration data and log files.

CVE-2022-40623 wavlink vulnerability CVSS: 0 13 Sep 2022, 21:15 UTC

The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 does not utilize anti-CSRF tokens, which, when combined with other issues (such as CVE-2022-35518), can lead to remote, unauthenticated command execution.

CVE-2022-40622 wavlink vulnerability CVSS: 0 13 Sep 2022, 21:15 UTC

The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.

CVE-2022-40621 wavlink vulnerability CVSS: 0 13 Sep 2022, 21:15 UTC

Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.

CVE-2022-37149 wavlink vulnerability CVSS: 0 30 Aug 2022, 15:15 UTC

WAVLINK WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability when operating the file adm.cgi. This vulnerability allows attackers to execute arbitrary commands via the username parameter.

CVE-2022-35538 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: delete_list, delete_al_mac, b_delete_list and b_delete_al_mac, which leads to command injection in page /wifi_mesh.shtml.

CVE-2022-35537 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameters: mac_5g and Newname, which leads to command injection in page /wifi_mesh.shtml.

CVE-2022-35536 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: qos_bandwith and qos_dat, which leads to command injection in page /qos.shtml.

CVE-2022-35535 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter macAddr, which leads to command injection in page /wifi_mesh.shtml.

CVE-2022-35534 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 wireless.cgi has no filtering on parameter hiddenSSID32g and SSID2G2, which leads to command injection in page /wifi_multi_ssid.shtml.

CVE-2022-35533 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 qos.cgi has no filtering on parameters: cli_list and cli_num, which leads to command injection in page /qos.shtml.

CVE-2022-35526 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 login.cgi has no filtering on parameter key, which leads to command injection in page /login.shtml.

CVE-2022-35525 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameter led_switch, which leads to command injection in page /ledonoff.shtml.

CVE-2022-35524 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: wlan_signal, web_pskValue, sel_EncrypTyp, sel_Automode, wlan_bssid, wlan_ssid and wlan_channel, which leads to command injection in page /wizard_rep.shtml.

CVE-2022-35523 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter del_mac and parameter flag, which leads to command injection in page /cli_black_list.shtml.

CVE-2022-35522 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: ppp_username, ppp_passwd, rwan_gateway, rwan_mask and rwan_ip, which leads to command injection in page /wan.shtml.

CVE-2022-35521 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.

CVE-2022-35520 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 api.cgi has no filtering on parameter ufconf, and this is a hidden parameter which doesn't appear in POST body, but exist in cgi binary. This leads to command injection in page /ledonoff.shtml.

CVE-2022-35519 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameter add_mac, which leads to command injection in page /cli_black_list.shtml.

CVE-2022-35518 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 nas.cgi has no filtering on parameters: User1Passwd and User1, which leads to command injection in page /nas_disk.shtml.

CVE-2022-35517 wavlink vulnerability CVSS: 0 10 Aug 2022, 20:15 UTC

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.

CVE-2022-34577 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

A vulnerability in adm.cgi of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to execute arbitrary code via a crafted POST request.

CVE-2022-34576 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to execute arbitrary code via a crafted POST request.

CVE-2022-34575 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing fctest.shtml.

CVE-2022-34574 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing Tftpd32.ini.

CVE-2022-34573 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml.

CVE-2022-34572 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.

CVE-2022-34571 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.

CVE-2022-34570 wavlink vulnerability CVSS: 0 25 Jul 2022, 22:15 UTC

WAVLINK WN579 X3 M79X3.V5030.191012/M79X3.V5030.191012 contains an information leak which allows attackers to obtain the key information via accessing the messages.txt page.

CVE-2022-34049 wavlink vulnerability CVSS: 0 20 Jul 2022, 17:15 UTC

An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows unauthenticated attackers to download log files and configuration data.

CVE-2022-34048 wavlink vulnerability CVSS: 0 20 Jul 2022, 17:15 UTC

Wavlink WN533A8 M33A8.V5030.190716 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the login_page parameter.

CVE-2022-34047 wavlink vulnerability CVSS: 0 20 Jul 2022, 17:15 UTC

An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].

CVE-2022-34046 wavlink vulnerability CVSS: 0 20 Jul 2022, 17:15 UTC

An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].

CVE-2022-34045 wavlink vulnerability CVSS: 0 20 Jul 2022, 17:15 UTC

Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.

CVE-2022-2488 wavlink vulnerability CVSS: 0 20 Jul 2022, 12:15 UTC

A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.

CVE-2022-2487 wavlink vulnerability CVSS: 0 20 Jul 2022, 12:15 UTC

A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.

CVE-2022-2486 wavlink vulnerability CVSS: 0 20 Jul 2022, 12:15 UTC

A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.

CVE-2022-34592 wavlink vulnerability CVSS: 7.5 07 Jul 2022, 19:15 UTC

Wavlink WL-WN575A3 RPT75A3.V4300.201217 was discovered to contain a command injection vulnerability via the function obtw. This vulnerability allows attackers to execute arbitrary commands via a crafted POST request.

CVE-2022-31847 wavlink vulnerability CVSS: 5.0 14 Jun 2022, 14:15 UTC

A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.

CVE-2022-31846 wavlink vulnerability CVSS: 5.0 14 Jun 2022, 14:15 UTC

A vulnerability in live_mfg.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.

CVE-2022-31845 wavlink vulnerability CVSS: 5.0 14 Jun 2022, 14:15 UTC

A vulnerability in live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 allows attackers to obtain sensitive router information via execution of the exec cmd function.

CVE-2022-31311 wavlink vulnerability CVSS: 10.0 14 Jun 2022, 14:15 UTC

An issue in adm.cgi of WAVLINK AERIAL X 1200M M79X3.V5030.180719 allows attackers to execute arbitrary commands via a crafted POST request.

CVE-2022-31309 wavlink vulnerability CVSS: 5.0 14 Jun 2022, 14:15 UTC

A vulnerability in live_check.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.180719 allows attackers to obtain sensitive router information via execution of the exec cmd function.

CVE-2022-31308 wavlink vulnerability CVSS: 5.0 14 Jun 2022, 14:15 UTC

A vulnerability in live_mfg.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.191012 allows attackers to obtain sensitive router information via execution of the exec cmd function.

CVE-2022-30489 wavlink vulnerability CVSS: 4.3 13 May 2022, 13:15 UTC

WAVLINK WN535 G3 was discovered to contain a cross-site scripting (XSS) vulnerability via the hostname parameter at /cgi-bin/login.cgi.

CVE-2022-23900 wavlink vulnerability CVSS: 7.5 07 Apr 2022, 11:15 UTC

A command injection vulnerability in the API of the Wavlink WL-WN531P3 router, version M31G3.V5030.201204, allows an attacker to achieve unauthorized remote code execution via a malicious POST request through /cgi-bin/adm.cgi.

CVE-2021-44260 wavlink vulnerability CVSS: 5.0 17 Mar 2022, 13:15 UTC

A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.

CVE-2021-44259 wavlink vulnerability CVSS: 7.5 17 Mar 2022, 13:15 UTC

A vulnerability is in the 'wx.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When an unauthorized user accesses this page directly, it connects to this device as a friend of the device owner.

CVE-2020-13117 wavlink vulnerability CVSS: 10.0 09 Feb 2021, 19:15 UTC

Wavlink WN575A4 and WN579X3 devices through 2020-05-15 allow unauthenticated remote users to inject commands via the key parameter in a login request.

CVE-2020-12127 wavlink vulnerability CVSS: 5.0 02 Oct 2020, 09:15 UTC

An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.

CVE-2020-12126 wavlink vulnerability CVSS: 7.5 02 Oct 2020, 09:15 UTC

Multiple authentication bypass vulnerabilities in the /cgi-bin/ endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to leak router settings, change configuration variables, and cause denial of service via an unauthenticated endpoint.

CVE-2020-12125 wavlink vulnerability CVSS: 10.0 02 Oct 2020, 09:15 UTC

A remote buffer overflow vulnerability in the /cgi-bin/makeRequest.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary machine instructions as root without authentication.

CVE-2020-12124 wavlink vulnerability CVSS: 10.0 02 Oct 2020, 09:15 UTC

A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.

CVE-2020-12123 wavlink vulnerability CVSS: 7.8 02 Oct 2020, 09:15 UTC

CSRF vulnerabilities in the /cgi-bin/ directory of the WAVLINK WN530H4 M30H4.V5030.190403 allow an attacker to remotely access router endpoints, because these endpoints do not contain CSRF tokens. If a user is authenticated in the router portal, then this attack will work.

CVE-2020-15490 wavlink vulnerability CVSS: 10.0 01 Jul 2020, 21:15 UTC

An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple buffer overflow vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges. (The set of affected scripts is similar to CVE-2020-12266.)

CVE-2020-15489 wavlink vulnerability CVSS: 10.0 01 Jul 2020, 21:15 UTC

An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.

CVE-2020-10974 wavlink vulnerability CVSS: 5.0 07 May 2020, 18:15 UTC

An issue was discovered affecting a backup feature where a crafted POST request returns the current configuration of the device in cleartext, including the administrator password. No authentication is required. Affected devices: Wavlink WN575A3, Wavlink WN579G3, Wavlink WN531A6, Wavlink WN535G3, Wavlink WN530H4, Wavlink WN57X93, Wavlink WN572HG3, Wavlink WN575A4, Wavlink WN578A2, Wavlink WN579G3, Wavlink WN579X3, and Jetstream AC3000/ERAC3000

CVE-2020-10973 wavlink vulnerability CVSS: 5.0 07 May 2020, 18:15 UTC

An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password. No authentication is required. The attacker must perform a decryption step, but all decryption information is readily available.

CVE-2020-10972 wavlink vulnerability CVSS: 5.0 07 May 2020, 18:15 UTC

An issue was discovered where a page is exposed that has the current administrator password in cleartext in the source code of the page. No authentication is required in order to reach the page (a certain live_?.shtml page with the variable syspasswd). Affected Devices: Wavlink WN530HG4, Wavlink WN531G3, and Wavlink WN572HG3

CVE-2020-10971 wavlink vulnerability CVSS: 9.3 07 May 2020, 18:15 UTC

An issue was discovered on Wavlink Jetstream devices where a crafted POST request can be sent to adm.cgi that will result in the execution of the supplied command if there is an active session at the same time. The POST request itself is not validated to ensure it came from the active session. Affected devices are: Wavlink WN530HG4, Wavlink WN575A3, Wavlink WN579G3,Wavlink WN531G3, Wavlink WN533A8, Wavlink WN531A6, Wavlink WN551K1, Wavlink WN535G3, Wavlink WN530H4, Wavlink WN57X93, WN572HG3, Wavlink WN578A2, Wavlink WN579G3, Wavlink WN579X3, and Jetstream AC3000/ERAC3000

CVE-2020-12266 wavlink vulnerability CVSS: 5.0 27 Apr 2020, 15:15 UTC

An issue was discovered where there are multiple externally accessible pages that do not require any sort of authentication, and store system information for internal usage. The devices automatically query these pages to update dashboards and other statistics, but the pages can be accessed externally without any authentication. All the pages follow the naming convention live_(string).shtml. Among the information disclosed is: interface status logs, IP address of the device, MAC address of the device, model and current firmware version, location, all running processes, all interfaces and their statuses, all current DHCP leases and the associated hostnames, all other wireless networks in range of the router, memory statistics, and components of the configuration of the device such as enabled features. Affected devices: Affected devices are: Wavlink WN530HG4, Wavlink WN575A3, Wavlink WN579G3,Wavlink WN531G3, Wavlink WN533A8, Wavlink WN531A6, Wavlink WN551K1, Wavlink WN535G3, Wavlink WN530H4, Wavlink WN57X93, WN572HG3, Wavlink WN578A2, Wavlink WN579G3, Wavlink WN579X3, and Jetstream AC3000/ERAC3000