CVE-2024-10428

A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/ Exploit Third Party Advisory
https://vuldb.com/?ctiid.281969 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.281969 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?submit.427272 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*

History

13 Nov 2024, 17:57

Type Values Removed Values Added
References () https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/ - () https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/ - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.281969 - () https://vuldb.com/?ctiid.281969 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.281969 - () https://vuldb.com/?id.281969 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.427272 - () https://vuldb.com/?submit.427272 - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*
First Time Wavlink wn530h4
Wavlink
Wavlink wn530h4 Firmware
Wavlink wn572hg3
Wavlink wn530hg4
Wavlink wn572hg3 Firmware
Wavlink wn530hg4 Firmware

28 Oct 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en WAVLINK WN530H4, WN530HG4 y WN572HG3 hasta el 28/10/2022. Se ha calificado como crítica. Este problema afecta a la función set_ipv6 del archivo firewall.cgi. La manipulación del argumento dhcpGateway provoca la inyección de comandos. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse. Se contactó al proveedor con antelación sobre esta revelación, pero no respondió de ninguna manera.

27 Oct 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-27 21:15

Updated : 2024-11-13 17:57


NVD link : CVE-2024-10428

Mitre link : CVE-2024-10428

CVE.ORG link : CVE-2024-10428


JSON object : View

Products Affected

wavlink

  • wn530h4
  • wn530h4_firmware
  • wn530hg4_firmware
  • wn530hg4
  • wn572hg3_firmware
  • wn572hg3
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')