VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202501-1368 CVE-2024-39363 WAVLINK  of  WL-WN 533A8  Cross-site scripting vulnerability in firmware CVSS V2: 10.0
CVSS V3: 9.6
Severity: CRITICAL
A cross-site scripting (xss) vulnerability exists in the login.cgi set_lang_CountryCode() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a cross-site scripting vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. No detailed vulnerability details are currently available
VAR-202501-1382 CVE-2024-39360 WAVLINK  of  WL-WN 533A8  Command injection vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An os command injection vulnerability exists in the nas.cgi remove_dir() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a command injection vulnerability, which is caused by the nas.cgi remove_dir function failing to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1414 CVE-2024-39359 WAVLINK  of  WL-WN 533A8  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi DeleteMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1322 CVE-2024-39358 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi set_wzap() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_wzap function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1434 CVE-2024-39357 WAVLINK  of  WL-WN 533A8  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the wireless.cgi SetName function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1360 CVE-2024-39299 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the qos.cgi qos_sta_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1415 CVE-2024-39294 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi set_wzdgw4G() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_wzdgw4G function failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1369 CVE-2024-39288 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the internet.cgi set_add_routing() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the internet.cgi set_add_routing function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1323 CVE-2024-39280 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An external config control vulnerability exists in the nas.cgi set_smb_cfg() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. There is a command injection vulnerability in the WAVLINK AC3000 M33A8.V5030.210505 version. The vulnerability is caused by the nas.cgi set_smb_cfg function failing to properly filter special characters and commands in the constructed command
VAR-202501-1383 CVE-2024-39273 WAVLINK  of  WL-WN 533A8  Vulnerability related to lack of authentication for critical functions in firmware CVSS V2: 7.6
CVSS V3: 9.0
Severity: CRITICAL
A firmware update vulnerability exists in the fw_check.sh functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a lack of authentication vulnerability for critical functionality.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. No detailed vulnerability details are currently available
VAR-202501-1435 CVE-2024-38666 WAVLINK  of  WL-WN 533A8  Firmware vulnerabilities related to external control of system configuration or settings CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An external config control vulnerability exists in the openvpn.cgi openvpn_client_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 The firmware contains a vulnerability regarding external control of system configuration or settings.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has an external configuration control vulnerability, which stems from the fact that the openvpn.cgi openvpn_client_setup function fails to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1370 CVE-2024-37357 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 9.0
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi set_TR069() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_TR069 function failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1301 CVE-2024-37186 WAVLINK  of  WL-WN 533A8  Command injection vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
An os command injection vulnerability exists in the adm.cgi set_ledonoff() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi set_ledonoff function failing to properly filter special characters and commands in the constructed command. An attacker can exploit this vulnerability to cause arbitrary command execution
VAR-202501-1373 CVE-2024-37184 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the adm.cgi rep_as_bridge() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the adm.cgi rep_as_bridge function failing to properly verify the length of the input data. A remote attacker can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1404 CVE-2024-36493 WAVLINK  of  WL-WN 533A8  Stack-based buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the wireless.cgi set_wifi_basic() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the wireless.cgi set_wifi_basic function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1421 CVE-2024-36295 WAVLINK  of  WL-WN 533A8  Injection Vulnerability in Firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A command execution vulnerability exists in the qos.cgi qos_sta() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a command injection vulnerability, which is caused by the qos.cgi qos_sta function failing to properly filter special characters and commands in constructing commands. Attackers can exploit this vulnerability to execute arbitrary commands
VAR-202501-1324 CVE-2024-36290 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 10.0
Severity: CRITICAL
A buffer overflow vulnerability exists in the login.cgi Goto_chidx() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an unauthenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. The vulnerability is caused by the login.cgi Goto_chidx function failing to properly verify the length of the input data. Remote attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service attack
VAR-202501-1426 CVE-2024-36272 WAVLINK  of  WL-WN 533A8  Classic buffer overflow vulnerability in firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A buffer overflow vulnerability exists in the usbip.cgi set_info() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can use this vulnerability to execute arbitrary code or cause a denial of service
VAR-202501-1350 CVE-2024-36258 WAVLINK  of  WL-WN 533A8  Stack-based buffer overflow vulnerability in firmware CVSS V2: 10.0
CVSS V3: 10.0
Severity: CRITICAL
A stack-based buffer overflow vulnerability exists in the touchlist_sync.cgi touchlistsync() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary code execution. An attacker can send an HTTP request to trigger this vulnerability. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. WAVLINK AC3000 has a buffer overflow vulnerability, which is caused by the touchlist_sync.cgi touchlistsync function failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service
VAR-202501-1325 CVE-2024-34544 WAVLINK  of  WL-WN 533A8  Injection Vulnerability in Firmware CVSS V2: 8.3
CVSS V3: 9.1
Severity: CRITICAL
A command injection vulnerability exists in the wireless.cgi AddMac() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability. WAVLINK of WL-WN 533A8 Firmware has an injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. WAVLINK AC3000 is a wireless router from WAVLINK, a Chinese company. Attackers can exploit this vulnerability to execute arbitrary commands