CVE-2025-44868

Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-wn530h4_firmware:20220801:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-wn530h4:-:*:*:*:*:*:*:*

History

13 Jun 2025, 13:04

Type Values Removed Values Added
CPE cpe:2.3:o:wavlink:wl-wn530h4_firmware:20220801:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-wn530h4:-:*:*:*:*:*:*:*
First Time Wavlink
Wavlink wl-wn530h4
Wavlink wl-wn530h4 Firmware
References () https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WL-WN530H4/ping_test/readme.md - () https://github.com/Summermu/VulnForIoT/tree/main/Wavlink_WL-WN530H4/ping_test/readme.md - Exploit, Third Party Advisory
References () https://github.com/Summermu/VulnForIoT/blob/main/Wavlink_WL-WN530H4/ping_test/readme.md - () https://github.com/Summermu/VulnForIoT/blob/main/Wavlink_WL-WN530H4/ping_test/readme.md - Exploit, Third Party Advisory

06 May 2025, 16:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References
  • () https://github.com/Summermu/VulnForIoT/blob/main/Wavlink_WL-WN530H4/ping_test/readme.md -
CWE CWE-77

05 May 2025, 20:54

Type Values Removed Values Added
Summary
  • (es) Se descubrió que Wavlink WL-WN530H4 20220801 contenía una vulnerabilidad de inyección de comandos en la función ping_test de adm.cgi mediante el parámetro pingIp. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios mediante una solicitud manipulada.

02 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 15:15

Updated : 2025-06-13 13:04


NVD link : CVE-2025-44868

Mitre link : CVE-2025-44868

CVE.ORG link : CVE-2025-44868


JSON object : View

Products Affected

wavlink

  • wl-wn530h4
  • wl-wn530h4_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')