漏洞描述 一些Wavlink产品受到一个漏洞的影响,该漏洞可能允许未经身份验证的远程用户以root用户身份在Wavlink设备上执行任意命令。live_api.cgi文件的ip参数存在命令执行漏洞,攻击者可通过该漏洞获取服务器权限。
相关漏洞推荐 CVE-2022-2486: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2 WN535K3 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of th... CVE-2022-2487: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2/WN535K3 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection which affects unknown co... CVE-2022-2488: Wavlink WN535K2/WN535K3 - OS Command Injection POC 2025-09-01 | Wavlink WN535K2 Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in /cgi-bin/touchlist_sy... CVE-2020-10199: Nexus Repository before 3.21.2 allows JavaEL Injection POC 2025-09-01 | Nexus Repository 漏洞触发需要任意账户权限 body="Nexus Repository Manager" app="Nexus-Repository-Manager" CVE-2020-11455: LimeSurvey 4.1.11 - Path Traversal POC 2025-09-01 | LimeSurvey LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/a...