Overview
- Description
- A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file internet.cgi. The manipulation of the argument DDNS leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
- Source
- cna@vuldb.com
- NVD status
- Analyzed
Risk scores
CVSS 4.0
- Type
- Secondary
- Base score
- 5.1
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- MEDIUM
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Secondary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.4
- Vector string
- AV:N/AC:L/Au:M/C:P/I:P/A:P
Weaknesses
- cna@vuldb.com
- CWE-77
Social media
- Hype score
- Not currently trending
CVE-2024-10193 Critical Command Injection in WAVLINK Routers via DDNS Argument A critical vulnerability exists in WAVLINK models WN530H4, WN530HG4, and WN572HG3 up to version 20221028. It affects the ping_ddns fu... https://t.co/K7KSWuTB9e
@VulmonFeeds
20 Oct 2024
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10193 A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028 and classified as critical. This issue affects the function ping_ddns of the file i… https://t.co/vgYSeQwcE1
@CVEnew
20 Oct 2024
548 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:wavlink:wn530h4_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC6EC91A-7820-4387-ACB7-3747313DBDB0", "versionEndIncluding": "20221028" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3EA1D9AB-9DD2-42A8-BE96-6A07CB232C48" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:wavlink:wn530hg4_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80C4ED9C-1FC9-40F2-807B-5C90B69EF406", "versionEndIncluding": "20221028" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9ACAF792-450A-4C0D-81DF-CC61EBCA7305" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:wavlink:wn572hg3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F946982-3A15-4E5D-838B-CBDC56A813A2", "versionEndIncluding": "20221028" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D85484EB-22F0-4140-9B9F-AC5EB24159DA" } ], "operator": "OR" } ], "operator": "AND" } ]