A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.232236 Permissions Required Third Party Advisory
https://vuldb.com/?id.232236 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-06-23T09:31:03.911Z

Updated: 2023-10-23T13:39:18.352Z

Reserved: 2023-06-23T09:14:21.253Z


Link: CVE-2023-3380

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-06-23T10:15:10.717

Modified: 2024-05-17T02:27:27.863


Link: CVE-2023-3380

JSON object: View

cve-icon Redhat Information

No data.

CWE