ID

VAR-202207-1912


CVE

CVE-2022-34572


TITLE

WAVLINK  of  wifi-repeater  Direct request submission vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2022-013827

DESCRIPTION

An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt. WAVLINK of wifi-repeater Firmware has a direct request submission vulnerability.Information may be obtained. WAVLINK WiFi-Repeater is a WiFi range extender produced by China Ruiyin Technology (WAVLINK) company. There is a security vulnerability in WAVLINK WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 version

Trust: 1.8

sources: NVD: CVE-2022-34572 // JVNDB: JVNDB-2022-013827 // VULHUB: VHN-426922 // VULMON: CVE-2022-34572

AFFECTED PRODUCTS

vendor:wavlinkmodel:wifi-repeaterscope:eqversion:rpta2-77w.m4300.01.gd.2017sep19

Trust: 1.0

vendor:wavlinkmodel:wifi-repeaterscope:eqversion: -

Trust: 0.8

vendor:wavlinkmodel:wifi-repeaterscope:eqversion:wifi-repeater firmware rpta2-77w.m4300.01.gd.2017sep19

Trust: 0.8

vendor:wavlinkmodel:wifi-repeaterscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013827 // NVD: CVE-2022-34572

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34572
value: MEDIUM

Trust: 1.0

NVD: CVE-2022-34572
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202207-2396
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2022-34572
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.1
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-34572
baseSeverity: MEDIUM
baseScore: 5.7
vectorString: CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013827 // CNNVD: CNNVD-202207-2396 // NVD: CVE-2022-34572

PROBLEMTYPE DATA

problemtype:CWE-425

Trust: 1.0

problemtype:Direct request submission (CWE-425) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-862

Trust: 0.1

sources: VULHUB: VHN-426922 // JVNDB: JVNDB-2022-013827 // NVD: CVE-2022-34572

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202207-2396

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202207-2396

EXTERNAL IDS

db:NVDid:CVE-2022-34572

Trust: 3.4

db:JVNDBid:JVNDB-2022-013827

Trust: 0.8

db:CNNVDid:CNNVD-202207-2396

Trust: 0.7

db:VULHUBid:VHN-426922

Trust: 0.1

db:VULMONid:CVE-2022-34572

Trust: 0.1

sources: VULHUB: VHN-426922 // VULMON: CVE-2022-34572 // JVNDB: JVNDB-2022-013827 // CNNVD: CNNVD-202207-2396 // NVD: CVE-2022-34572

REFERENCES

url:https://github.com/pghuanghui/cve_request/blob/main/wifi-repeater/wifi-repeater_syslog.shtml.assets/wifi-repeater_tftp.md

Trust: 2.6

url:https://www.wavlink.com/en_us/category/repeater.html

Trust: 2.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-34572

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34572/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-426922 // VULMON: CVE-2022-34572 // JVNDB: JVNDB-2022-013827 // CNNVD: CNNVD-202207-2396 // NVD: CVE-2022-34572

SOURCES

db:VULHUBid:VHN-426922
db:VULMONid:CVE-2022-34572
db:JVNDBid:JVNDB-2022-013827
db:CNNVDid:CNNVD-202207-2396
db:NVDid:CVE-2022-34572

LAST UPDATE DATE

2024-08-14T14:55:19.793000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-426922date:2022-08-03T00:00:00
db:VULMONid:CVE-2022-34572date:2022-07-26T00:00:00
db:JVNDBid:JVNDB-2022-013827date:2023-09-12T08:19:00
db:CNNVDid:CNNVD-202207-2396date:2022-08-10T00:00:00
db:NVDid:CVE-2022-34572date:2023-08-08T14:22:24.967

SOURCES RELEASE DATE

db:VULHUBid:VHN-426922date:2022-07-25T00:00:00
db:VULMONid:CVE-2022-34572date:2022-07-25T00:00:00
db:JVNDBid:JVNDB-2022-013827date:2023-09-12T00:00:00
db:CNNVDid:CNNVD-202207-2396date:2022-07-25T00:00:00
db:NVDid:CVE-2022-34572date:2022-07-25T22:15:08.500