CVE-2022-31309

A vulnerability in live_check.shtml of WAVLINK AERIAL X 1200M M79X3.V5030.180719 allows attackers to obtain sensitive router information via execution of the exec cmd function.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:aerial_x_1200m_firmware:m79x3.v5030.180719:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:aerial_x_1200m:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md - Exploit, Third Party Advisory () https://github.com/pghuanghui/CVE_Request/blob/main/WAVLINK%20AC1200_check_live.md - Exploit, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-668 CWE-200

Information

Published : 2022-06-14 14:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31309

Mitre link : CVE-2022-31309

CVE.ORG link : CVE-2022-31309


JSON object : View

Products Affected

wavlink

  • aerial_x_1200m
  • aerial_x_1200m_firmware
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor