CVE-2022-40623

The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 does not utilize anti-CSRF tokens, which, when combined with other issues (such as CVE-2022-35518), can lead to remote, unauthenticated command execution.
References
Link Resource
https://youtu.be/cSileV8YbsQ?t=1028 Exploit Third Party Advisory
https://youtu.be/cSileV8YbsQ?t=1028 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn531g3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn531g3:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:21

Type Values Removed Values Added
References () https://youtu.be/cSileV8YbsQ?t=1028 - Exploit, Third Party Advisory () https://youtu.be/cSileV8YbsQ?t=1028 - Exploit, Third Party Advisory

Information

Published : 2022-09-13 21:15

Updated : 2024-11-21 07:21


NVD link : CVE-2022-40623

Mitre link : CVE-2022-40623

CVE.ORG link : CVE-2022-40623


JSON object : View

Products Affected

wavlink

  • wn531g3_firmware
  • wn531g3
CWE
CWE-352

Cross-Site Request Forgery (CSRF)