Command Injection Vulnerability in WAVLINK Firewall Configuration

Command Injection Vulnerability in WAVLINK Firewall Configuration

CVE-2022-35521 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml.

Learn more about our Web Application Penetration Testing UK.