CVE-2023-29708

An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:android:*:*
cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 07:57

Type Values Removed Values Added
References () https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - Third Party Advisory () https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - Third Party Advisory
References () https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - Exploit, Third Party Advisory () https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - Exploit, Third Party Advisory

30 Jun 2023, 15:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:iphone_os:*:*
cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:android:*:*
References (MISC) https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - (MISC) https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - Third Party Advisory
References (MISC) https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - (MISC) https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - Exploit, Third Party Advisory
First Time Wavlink
Wavlink wavrouter App

22 Jun 2023, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 11:15

Updated : 2024-11-21 07:57


NVD link : CVE-2023-29708

Mitre link : CVE-2023-29708

CVE.ORG link : CVE-2023-29708


JSON object : View

Products Affected

wavlink

  • wavrouter_app