Wavlink WN535K2 漏洞列表
共找到 6 个与 Wavlink WN535K2 相关的漏洞
📅 加载漏洞趋势中...
-
CVE-2022-2486: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade via manipulation of the argument key. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. SHODAN: http.title:"Wi-Fi APP Login" -
CVE-2022-2487: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection which affects unknown code in /cgi-bin/nightled.cgi via manipulation of the argument start_hour. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. SHODAN: http.title:"Wi-Fi APP Login" -
CVE-2022-2488: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in /cgi-bin/touchlist_sync.cgi via manipulation of the argument IP. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. SHODAN: http.title:"Wi-Fi APP Login" -
CVE-2022-2486: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade via manipulation of the argument key. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. -
CVE-2022-2487: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection which affects unknown code in /cgi-bin/nightled.cgi via manipulation of the argument start_hour. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. -
CVE-2022-2488: Wavlink WN535K2/WN535K3 - OS Command Injection POC
Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in /cgi-bin/touchlist_sync.cgi via manipulation of the argument IP. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.