Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
WAVLINK WL-WN576K1 HTTP POST Request login.cgi sys_login buffer overflow
Vulnerability Description
A vulnerability was found in WAVLINK QUANTUM D2G, QUANTUM D3G, WL-WN530G3A, WL-WN530HG3, WL-WN532A3 and WL-WN576K1 up to V1410_240222 and classified as critical. Affected by this issue is the function sys_login of the file /cgi-bin/login.cgi of the component HTTP POST Request Handler. The manipulation of the argument login_page leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
Vulnerability Title
WAVLINK和ch 安全漏洞
Vulnerability Description
WAVLINK是中国睿因(WAVLINK)公司的一款路由器。连接两个或多个网络的硬件设备,在网络间起网关的作用。 WAVLINK多款产品存在安全漏洞,该漏洞源于文件/cgi-bin/login.cgi中参数login_page存在缓冲区溢出。以下产品和版本受到影响:WAVLINK QUANTUM D2G、QUANTUM D3G、WL-WN530G3A、WL-WN530HG3、WL-WN532A3和WL-WN576K1 V1410_240222及之前版本,
CVSS Information
N/A
Vulnerability Type
N/A