Vulnerabilities (CVE)

Filtered by vendor Wavlink Subscribe
Total 85 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-44868 1 Wavlink 2 Wl-wn530h4, Wl-wn530h4 Firmware 2025-06-13 N/A 9.8 CRITICAL
Wavlink WL-WN530H4 20220801 was found to contain a command injection vulnerability in the ping_test function of the adm.cgi via the pingIp parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
CVE-2024-38894 1 Wavlink 2 Wn551k1, Wn551k1 Firmware 2025-06-06 N/A 5.3 MEDIUM
WAVLINK WN551K1 found a command injection vulnerability through the IP parameter of /cgi-bin/touchlist_sync.cgi.
CVE-2024-38892 1 Wavlink 2 Wn551k1, Wn551k1 Firmware 2025-06-06 N/A 6.5 MEDIUM
An issue in Wavlink WN551K1 allows a remote attacker to obtain sensitive information via the ExportAllSettings.sh component.
CVE-2024-38895 1 Wavlink 2 Wn551k1, Wn551k1 Firmware 2025-06-06 N/A 5.3 MEDIUM
WAVLINK WN551K1'live_mfg.shtml enables attackers to obtain sensitive router information.
CVE-2024-38896 1 Wavlink 2 Wn551k1, Wn551k1 Firmware 2025-06-06 N/A 5.3 MEDIUM
WAVLINK WN551K1 found a command injection vulnerability through the start_hour parameter of /cgi-bin/nightled.cgi.
CVE-2024-38897 1 Wavlink 2 Wn551k1, Wn551k1 Firmware 2025-06-06 N/A 5.3 MEDIUM
WAVLINK WN551K1'live_check.shtml enables attackers to obtain sensitive router information.
CVE-2025-44881 1 Wavlink 2 Wl-wn579a3, Wl-wn579a3 Firmware 2025-05-30 N/A 9.8 CRITICAL
A command injection vulnerability in the component /cgi-bin/qos.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input.
CVE-2025-44880 1 Wavlink 2 Wl-wn579a3, Wl-wn579a3 Firmware 2025-05-30 N/A 9.8 CRITICAL
A command injection vulnerability in the component /cgi-bin/adm.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input.
CVE-2025-44882 1 Wavlink 2 Wl-wn579a3, Wl-wn579a3 Firmware 2025-05-30 N/A 9.8 CRITICAL
A command injection vulnerability in the component /cgi-bin/firewall.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input.
CVE-2022-44356 1 Wavlink 2 Wl-wn531g3, Wl-wn531g3 Firmware 2025-04-25 N/A 7.5 HIGH
WAVLINK Quantum D4G (WL-WN531G3) running firmware versions M31G3.V5030.201204 and M31G3.V5030.200325 has an access control issue which allows unauthenticated attackers to download configuration data and log files.
CVE-2022-48164 1 Wavlink 2 Wl-wn533a8, Wl-wn533a8 Firmware 2025-03-26 N/A 7.5 HIGH
An access control issue in the component /cgi-bin/ExportLogs.sh of Wavlink WL-WN533A8 M33A8.V5030.190716 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.
CVE-2022-48166 1 Wavlink 2 Wl-wn530hg4, Wl-wn530hg4 Firmware 2025-03-25 N/A 7.5 HIGH
An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.
CVE-2022-2488 1 Wavlink 4 Wl-wn535k2, Wl-wn535k2 Firmware, Wl-wn535k3 and 1 more 2025-01-14 N/A 8.0 HIGH
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
CVE-2023-29708 1 Wavlink 1 Wavrouter App 2024-12-06 N/A 7.5 HIGH
An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
CVE-2023-32622 1 Wavlink 2 Wl-wn531ax2, Wl-wn531ax2 Firmware 2024-12-04 N/A 7.2 HIGH
Improper neutralization of special elements in WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to execute OS commands with the root privilege.
CVE-2023-32612 1 Wavlink 2 Wl-wn531ax2, Wl-wn531ax2 Firmware 2024-11-27 N/A 7.2 HIGH
Client-side enforcement of server-side security issue exists in WL-WN531AX2 firmware versions prior to 2023526, which may allow an attacker with an administrative privilege to execute OS commands with the root privilege.
CVE-2023-3380 1 Wavlink 2 Wn579x3, Wn579x3 Firmware 2024-11-21 5.8 MEDIUM 4.7 MEDIUM
A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-38861 1 Wavlink 2 Wl-wn575a3, Wl-wn575a3 Firmware 2024-11-21 N/A 9.8 CRITICAL
An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi.
CVE-2023-32621 1 Wavlink 2 Wl-wn531ax2, Wl-wn531ax2 Firmware 2024-11-21 N/A 7.2 HIGH
WL-WN531AX2 firmware versions prior to 2023526 allows an attacker with an administrative privilege to upload arbitrary files and execute OS commands with the root privilege.
CVE-2023-32620 1 Wavlink 2 Wl-wn531ax2, Wl-wn531ax2 Firmware 2024-11-21 N/A 6.5 MEDIUM
Improper authentication vulnerability in WL-WN531AX2 firmware versions prior to 2023526 allows a network-adjacent attacker to obtain a password for the wireless network.