漏洞描述 一些Wavlink产品受到一个漏洞的影响,该漏洞可能允许未经身份验证的远程用户以root用户身份在Wavlink设备上执行任意命令。adm.cgi文件的command参数存在命令执行漏洞,攻击者可通过该漏洞获取服务器权限。
相关漏洞推荐 CVE-2022-2486: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2 WN535K3 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of th... CVE-2022-2487: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2/WN535K3 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection which affects unknown co... CVE-2022-2488: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in /cgi-bin/touchlist_sy... Webmin /package-updates/update.cgi 命令执行漏洞(CVE-2022-36446) 无POC 2025-09-05 | Webmin Webmin是Webmin社区的一套基于Web的用于类Unix操作系统中的系统管理工具。 Webmin 1.997之前的版本存在安全漏洞,该漏洞源于其software/apt-lib.pl组件缺少对U... CVE-2022-0342: Zyxel authentication bypass patch analysis POC 2025-09-01 | Zyxel An authentication bypass vulnerability in the CGI program of Zyxel USG/ZyWALL series firmware versio...