漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
WAVLINK WN530H4/WN530HG4/WN572HG3 firewall.cgi set_ipv6 command injection
Vulnerability Description
A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Vulnerability Title
WAVLINK多款产品 命令注入漏洞
Vulnerability Description
WAVLINK WN530HG4等都是中国睿因(WAVLINK)公司的产品。WAVLINK WN530HG4是一个无线路由器。WAVLINK WN530H4是一款路由器。WAVLINK WN572HG3是一个无线路由器。 WAVLINK多款产品存在命令注入漏洞,该漏洞源于文件firewall.cgi的功能set_ipv6的参数dhcpGateway会导致命令注入。以下产品及版本受到影响:WAVLINK WN530H4 20220721版本、WN530HG4 20220809版本和WN572HG3 WO 2
CVSS Information
N/A
Vulnerability Type
N/A