An os command injection vulnerability exists in the firewall.cgi iptablesWebsFilterRun() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wavlink
Wavlink wl-wn533a8 Wavlink wl-wn533a8 Firmware |
|
CPEs | cpe:2.3:h:wavlink:wl-wn533a8:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-wn533a8_firmware:m33a8.v5030.210505:*:*:*:*:*:*:* |
|
Vendors & Products |
Wavlink
Wavlink wl-wn533a8 Wavlink wl-wn533a8 Firmware |
Wed, 15 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 14 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 14 Jan 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An os command injection vulnerability exists in the firewall.cgi iptablesWebsFilterRun() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. | |
Weaknesses | CWE-77 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: talos
Published: 2025-01-14T14:21:31.742Z
Updated: 2025-01-15T21:07:57.186Z
Reserved: 2024-06-28T16:07:50.495Z
Link: CVE-2024-39367

Updated: 2025-01-14T16:04:06.701Z

Status : Analyzed
Published: 2025-01-14T15:15:19.677
Modified: 2025-08-21T17:46:32.570
Link: CVE-2024-39367

No data.