CVE-2024-10429

A vulnerability classified as critical has been found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. Affected is the function set_ipv6 of the file internet.cgi. The manipulation of the argument IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://docs.google.com/document/d/1ktuys5jr7MKwz503QBbEfxZ5mZbXlbvl/ Exploit Third Party Advisory
https://vuldb.com/?ctiid.281970 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.281970 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?submit.427274 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*

History

13 Nov 2024, 17:58

Type Values Removed Values Added
CPE cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn572hg3_firmware:20221028:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn530hg4_firmware:20220809:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wn530h4_firmware:20220721:*:*:*:*:*:*:*
First Time Wavlink wn530h4
Wavlink
Wavlink wn530h4 Firmware
Wavlink wn572hg3
Wavlink wn530hg4
Wavlink wn572hg3 Firmware
Wavlink wn530hg4 Firmware
References () https://docs.google.com/document/d/1ktuys5jr7MKwz503QBbEfxZ5mZbXlbvl/ - () https://docs.google.com/document/d/1ktuys5jr7MKwz503QBbEfxZ5mZbXlbvl/ - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.281970 - () https://vuldb.com/?ctiid.281970 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?id.281970 - () https://vuldb.com/?id.281970 - Permissions Required, Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.427274 - () https://vuldb.com/?submit.427274 - Exploit, Third Party Advisory, VDB Entry

28 Oct 2024, 13:58

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad clasificada como crítica en WAVLINK WN530H4, WN530HG4 y WN572HG3 hasta 20221028. La función set_ipv6 del archivo internet.cgi está afectada. La manipulación del argumento IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr provoca la inyección de comandos. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. Se contactó al proveedor con anticipación sobre esta divulgación pero no respondió de ninguna manera.

27 Oct 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-27 21:15

Updated : 2024-11-13 17:58


NVD link : CVE-2024-10429

Mitre link : CVE-2024-10429

CVE.ORG link : CVE-2024-10429


JSON object : View

Products Affected

wavlink

  • wn530h4
  • wn530h4_firmware
  • wn530hg4_firmware
  • wn530hg4
  • wn572hg3_firmware
  • wn572hg3
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')