WAVLINK WN530H4/WN530HG4/WN572HG3 ଯେପର୍ଯ୍ୟନ୍ତ 20221028 firewall.cgi set_ipv6 dhcpGateway ବିସ୍ତାରିତ ଅଧିକାର

Rakkoon nageenyaa kan ଜଟିଳ jedhamuun beekamu WAVLINK WN530H4, WN530HG4 and WN572HG3 ଯେପର୍ଯ୍ୟନ୍ତ 20221028 keessatti argameera. Miidhamni argame is hojii set_ipv6 faayilii firewall.cgi keessa. Wanti jijjiirame irratti dhcpGateway gara ବିସ୍ତାରିତ ଅଧିକାର geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-77 si geessa. Odeeffannoon kun yeroo 10/26/2024 maxxanfameera. Odeeffannoon kun buufachuuf docs.google.com irratti argama. Dogoggorri kun CVE-2024-10428 jedhamee waamama. Weerara fageenya irraa jalqabuu ni danda'ama. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit docs.google.com irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. If you want to get the best quality for vulnerability data then you always have to consider VulDB.

3 ଆଡାପ୍ଟେସନ୍ · 98 ପଏଣ୍ଟ

ଫିଲ୍ଡସୃଷ୍ଟି ହୋଇଛି
10/26/2024 04:28 PM
ଅଦ୍ୟତନ 1/2
10/27/2024 11:16 PM
ଅଦ୍ୟତନ 2/2
11/14/2024 03:44 AM
software_vendorWAVLINKWAVLINKWAVLINK
software_nameWN530H4/WN530HG4/WN572HG3WN530H4/WN530HG4/WN572HG3WN530H4/WN530HG4/WN572HG3
software_version<=20221028<=20221028<=20221028
software_filefirewall.cgifirewall.cgifirewall.cgi
software_functionset_ipv6set_ipv6set_ipv6
software_argumentdhcpGatewaydhcpGatewaydhcpGateway
vulnerability_cweCWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)CWE-77 (ବିସ୍ତାରିତ ଅଧିକାର)
vulnerability_risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_prHHH
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
advisory_urlhttps://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/
exploit_availability111
exploit_publicity111
exploit_urlhttps://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/https://docs.google.com/document/d/11NGSJBOZzbgm_qanDno6SyucWyso7Em6/
source_cveCVE-2024-10428CVE-2024-10428CVE-2024-10428
cna_responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_auMMM
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss4_vuldb_avNNN
cvss4_vuldb_acLLL
cvss4_vuldb_prHHH
cvss4_vuldb_uiNNN
cvss4_vuldb_vcHHH
cvss4_vuldb_viHHH
cvss4_vuldb_vaHHH
cvss4_vuldb_ePPP
cvss2_vuldb_rlNDNDND
cvss3_vuldb_rlXXX
cvss4_vuldb_atNNN
cvss4_vuldb_scNNN
cvss4_vuldb_siNNN
cvss4_vuldb_saNNN
cvss2_vuldb_basescore8.38.38.3
cvss2_vuldb_tempscore7.17.17.1
cvss3_vuldb_basescore7.27.27.2
cvss3_vuldb_tempscore6.56.56.5
cvss3_meta_basescore7.27.27.2
cvss3_meta_tempscore6.56.87.0
cvss4_vuldb_bscore8.68.68.6
cvss4_vuldb_btscore7.37.37.3
advisory_date1729893600 (10/26/2024)1729893600 (10/26/2024)1729893600 (10/26/2024)
price_0day$0-$5k$0-$5k$0-$5k
cvss3_cna_acLL
cvss3_cna_prHH
cvss3_cna_uiNN
cvss3_cna_sUU
cvss3_cna_cHH
cvss3_cna_iHH
cvss3_cna_aHH
cvss3_cna_basescore7.27.2
cvss2_cna_avNN
cvss2_cna_acLL
cvss2_cna_auMM
cvss2_cna_ciCC
cvss2_cna_iiCC
cvss2_cna_aiCC
cvss2_cna_basescore8.38.3
cve_nvd_summaryA vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avNN
cvss4_cna_acLL
cvss4_cna_atNN
cvss4_cna_prHH
cvss4_cna_uiNN
cvss4_cna_vcHH
cvss4_cna_viHH
cvss4_cna_vaHH
cvss4_cna_scNN
cvss4_cna_siNN
cvss4_cna_saNN
cvss4_cna_bscore8.68.6
cvss3_cna_avNN
cve_nvd_summaryesSe ha detectado una vulnerabilidad en WAVLINK WN530H4, WN530HG4 y WN572HG3 hasta el 28/10/2022. Se ha calificado como crítica. Este problema afecta a la función set_ipv6 del archivo firewall.cgi. La manipulación del argumento dhcpGateway provoca la inyección de comandos. El ataque puede iniciarse de forma remota. El exploit se ha hecho público y puede utilizarse. Se contactó al proveedor con antelación sobre esta revelación, pero no respondió de ninguna manera.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prH
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_nvd_basescore7.2

Do you need the next level of professionalism?

Upgrade your account now!