Vulnerabilities > Wavlink > Wn533A8 Firmware > High

DATE CVE VULNERABILITY TITLE RISK
2022-08-10 CVE-2022-35517 Unspecified vulnerability in Wavlink products
WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 adm.cgi has no filtering on parameters: web_pskValue, wl_Method, wlan_ssid, EncrypType, rwan_ip, rwan_mask, rwan_gateway, ppp_username, ppp_passwd and ppp_setver, which leads to command injection in page /wizard_router_mesh.shtml.
network
low complexity
wavlink
8.8
2022-07-20 CVE-2022-34046 Incorrect Authorization vulnerability in Wavlink Wn533A8 Firmware M33A8.V5030.190716
An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].
network
low complexity
wavlink CWE-863
7.5
2020-05-07 CVE-2020-10973 Missing Authentication for Critical Function vulnerability in Wavlink products
An issue was discovered in Wavlink WN530HG4, Wavlink WN531G3, Wavlink WN533A8, and Wavlink WN551K1 affecting /cgi-bin/ExportAllSettings.sh where a crafted POST request returns the current configuration of the device, including the administrator password.
network
low complexity
wavlink CWE-306
7.5
2020-04-27 CVE-2020-12266 Missing Authentication for Critical Function vulnerability in Wavlink products
An issue was discovered where there are multiple externally accessible pages that do not require any sort of authentication, and store system information for internal usage.
network
low complexity
wavlink CWE-306
7.5