ID

VAR-202207-1814


CVE

CVE-2022-34571


TITLE

WAVLINK  of  wifi-repeater  Direct request submission vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-013828

DESCRIPTION

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml. WAVLINK of wifi-repeater Firmware has a direct request submission vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK WiFi-Repeater is a WiFi range extender produced by China Ruiyin Technology (WAVLINK) company. There is a security vulnerability in WAVLINK WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 version

Trust: 1.8

sources: NVD: CVE-2022-34571 // JVNDB: JVNDB-2022-013828 // VULHUB: VHN-426921 // VULMON: CVE-2022-34571

AFFECTED PRODUCTS

vendor:wavlinkmodel:wifi-repeaterscope:eqversion:rpta2-77w.m4300.01.gd.2017sep19

Trust: 1.0

vendor:wavlinkmodel:wifi-repeaterscope:eqversion: -

Trust: 0.8

vendor:wavlinkmodel:wifi-repeaterscope:eqversion:wifi-repeater firmware rpta2-77w.m4300.01.gd.2017sep19

Trust: 0.8

vendor:wavlinkmodel:wifi-repeaterscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013828 // NVD: CVE-2022-34571

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34571
value: HIGH

Trust: 1.0

NVD: CVE-2022-34571
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202207-2399
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2022-34571
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.1
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-34571
baseSeverity: HIGH
baseScore: 8.0
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013828 // CNNVD: CNNVD-202207-2399 // NVD: CVE-2022-34571

PROBLEMTYPE DATA

problemtype:CWE-425

Trust: 1.0

problemtype:Direct request submission (CWE-425) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-863

Trust: 0.1

sources: VULHUB: VHN-426921 // JVNDB: JVNDB-2022-013828 // NVD: CVE-2022-34571

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202207-2399

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202207-2399

EXTERNAL IDS

db:NVDid:CVE-2022-34571

Trust: 3.4

db:JVNDBid:JVNDB-2022-013828

Trust: 0.8

db:CNNVDid:CNNVD-202207-2399

Trust: 0.7

db:VULHUBid:VHN-426921

Trust: 0.1

db:VULMONid:CVE-2022-34571

Trust: 0.1

sources: VULHUB: VHN-426921 // VULMON: CVE-2022-34571 // JVNDB: JVNDB-2022-013828 // CNNVD: CNNVD-202207-2399 // NVD: CVE-2022-34571

REFERENCES

url:https://github.com/pghuanghui/cve_request/blob/main/wifi-repeater/wifi-repeater_syslog.shtml.assets/wifi-repeater_syslog.shtml.md

Trust: 2.6

url:https://www.wavlink.com/en_us/category/repeater.html

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-34571

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34571/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-426921 // VULMON: CVE-2022-34571 // JVNDB: JVNDB-2022-013828 // CNNVD: CNNVD-202207-2399 // NVD: CVE-2022-34571

SOURCES

db:VULHUBid:VHN-426921
db:VULMONid:CVE-2022-34571
db:JVNDBid:JVNDB-2022-013828
db:CNNVDid:CNNVD-202207-2399
db:NVDid:CVE-2022-34571

LAST UPDATE DATE

2024-08-14T14:17:50.179000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426921date:2022-08-03T00:00:00
db:VULMONid:CVE-2022-34571date:2022-07-26T00:00:00
db:JVNDBid:JVNDB-2022-013828date:2023-09-12T08:19:00
db:CNNVDid:CNNVD-202207-2399date:2022-08-10T00:00:00
db:NVDid:CVE-2022-34571date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-426921date:2022-07-25T00:00:00
db:VULMONid:CVE-2022-34571date:2022-07-25T00:00:00
db:JVNDBid:JVNDB-2022-013828date:2023-09-12T00:00:00
db:CNNVDid:CNNVD-202207-2399date:2022-07-25T00:00:00
db:NVDid:CVE-2022-34571date:2022-07-25T22:15:08.457