CVE-2022-40622

The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.
References
Link Resource
https://youtu.be/cSileV8YbsQ?t=655 Exploit Third Party Advisory
https://youtu.be/cSileV8YbsQ?t=655 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn531g3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:21

Type Values Removed Values Added
References () https://youtu.be/cSileV8YbsQ?t=655 - Exploit, Third Party Advisory () https://youtu.be/cSileV8YbsQ?t=655 - Exploit, Third Party Advisory

Information

Published : 2022-09-13 21:15

Updated : 2024-11-21 07:21


NVD link : CVE-2022-40622

Mitre link : CVE-2022-40622

CVE.ORG link : CVE-2022-40622


JSON object : View

Products Affected

wavlink

  • wn531g3_firmware
  • wn531g3
CWE
CWE-304

Missing Critical Step in Authentication

CWE-287

Improper Authentication