VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-1343 CVE-2024-39764 WAVLINK AC3000 internet.cgi set_add_routing function dest parameter command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `dest` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the failure of the dest parameter of the internet.cgi set_add_routing function to properly filter special characters and commands in the constructed command
VAR-202501-1340 CVE-2024-39763 WAVLINK AC3000 internet.cgi set_add_routing function gateway parameter command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `gateway` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the gateway parameter of the internet.cgi set_add_routing function failing to properly filter special characters and commands in the constructed command
VAR-202501-1341 CVE-2024-39762 WAVLINK AC3000 internet.cgi set_add_routing function netmask parameter command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `netmask` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the netmask parameter of the internet.cgi set_add_routing function failing to properly filter special characters and commands in the constructed command
VAR-202501-1358 CVE-2024-39761 WAVLINK AC3000 Command Injection Vulnerability (CNVD-2025-08325) CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_week_value` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a command injection vulnerability, which stems from the fact that the restart_week_value parameter of the login.cgi set_sys_init function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1359 CVE-2024-39760 WAVLINK AC3000 login.cgi set_sys_init function restart_min_value parameter command injection vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_min_value` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the restart_min_value parameter of the login.cgi set_sys_init function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1357 CVE-2024-39759 WAVLINK AC3000 login.cgi set_sys_init function restart_hour_value parameter command injection vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
Multiple OS command injection vulnerabilities exist in the login.cgi set_sys_init() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an unauthenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists within the `restart_hour_value` POST parameter. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the restart_hour_value parameter of the login.cgi set_sys_init function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1320 CVE-2024-39757 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-09262) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi AddMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the wireless.cgi AddMac function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1349 CVE-2024-39756 WAVLINK AC3000 adm.cgi rep_as_router function buffer overflow vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi rep_as_router() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi rep_as_router function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1380 CVE-2024-39754 WAVLINK AC3000 static login vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
A static login vulnerability exists in the wctrls functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted set of network packets can lead to root access. An attacker can send packets to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1420 CVE-2024-39608 WAVLINK AC3000 Access Control Error Vulnerability CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
A firmware update vulnerability exists in the login.cgi functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can send an unauthenticated message to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company
VAR-202501-1321 CVE-2024-39604 WAVLINK AC3000 Command Execution Vulnerability (CNVD-2025-09260) CVSS V2: 7.6
CVSS V3: 9.0
Severity: CRITICAL
A command execution vulnerability exists in the update_filter_url.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1381 CVE-2024-39603 WAVLINK AC3000 Buffer Overflow Vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic_mesh() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the wireless.cgi set_wifi_basic_mesh function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1299 CVE-2024-39602 WAVLINK AC3000 nas.cgi set_nas function command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An external config control vulnerability exists in the nas.cgi set_nas() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the nas.cgi set_nas function failing to properly filter special characters and commands in the constructed command
VAR-202501-1413 CVE-2024-39370 WAVLINK AC3000 adm.cgi set_MeshAp function command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An arbitrary code execution vulnerability exists in the adm.cgi set_MeshAp() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the adm.cgi set_MeshAp function failing to properly filter special characters and commands in the constructed command
VAR-202501-1300 CVE-2024-39367 WAVLINK AC3000 firewall.cgi iptablesWebsFilterRun function command injection vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An os command injection vulnerability exists in the firewall.cgi iptablesWebsFilterRun() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the firewall.cgi iptablesWebsFilterRun function failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1368 CVE-2024-39363 WAVLINK AC3000 Cross-Site Scripting Vulnerability CVSS V2: 10.0
CVSS V3: 9.6
Severity: CRITICAL
A cross-site scripting (xss) vulnerability exists in the login.cgi set_lang_CountryCode() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. No detailed vulnerability details are currently available
VAR-202501-1382 CVE-2024-39360 WAVLINK AC3000 Command Injection Vulnerability (CNVD-2025-08327) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An os command injection vulnerability exists in the nas.cgi remove_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a command injection vulnerability, which is caused by the nas.cgi remove_dir function failing to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1414 CVE-2024-39359 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-09264) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi DeleteMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1322 CVE-2024-39358 WAVLINK AC3000 adm.cgi set_wzap function buffer overflow vulnerability CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi set_wzap() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_wzap function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1434 CVE-2024-39357 WAVLINK AC3000 Buffer Overflow Vulnerability (CNVD-2025-08335) CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the wireless.cgi SetName function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service