漏洞描述 在Wavlink WN530HG4、Wavlink WN531G3、WavlinkWN533A8和WavlinkWN551K1中发现一个影响/cgi-bin/ExportAllSettings.sh的问题,其中特制的POST请求返回设备的当前配置,包括管理员密码。不需要身份验证。攻击者必须执行解密步骤,但所有解密信息都很容易获得。
相关漏洞推荐 CVE-2022-34045: WAVLINK WN530HG4 - Improper Access Control POC 2025-08-01 | WAVLINK WN530HG4 WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. It contains a hardco... CVE-2022-34047: WAVLINK WN530HG4 - Improper Access Control POC 2025-08-01 | WAVLINK WN530HG4 WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can obta... CVE-2022-34049: WAVLINK WN530HG4 - Improper Access Control POC 2025-08-01 | WAVLINK WN530HG4 Wavlink WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can down... CVE-2020-10199: Nexus Repository before 3.21.2 allows JavaEL Injection POC 2025-09-01 | Nexus Repository 漏洞触发需要任意账户权限 body="Nexus Repository Manager" app="Nexus-Repository-Manager" CVE-2020-11455: LimeSurvey 4.1.11 - Path Traversal POC 2025-09-01 | LimeSurvey LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/a...