A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.232236 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.232236 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-06-23T09:31:03.911Z
Updated: 2023-10-23T13:39:18.352Z
Reserved: 2023-06-23T09:14:21.253Z
Link: CVE-2023-3380
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-23T10:15:10.717
Modified: 2024-05-17T02:27:27.863
Link: CVE-2023-3380
JSON object: View
Redhat Information
No data.
CWE