mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 10:41:40 +00:00
13 lines
917 B
Markdown
13 lines
917 B
Markdown
![]() |
## wavlink mesh.cgi command execution (CVE-2022-2486)
|
|||
|
|
|||
|
| **Vulnerability** | **wavlink mesh.cgi command execution (CVE-2022-2486)** |
|
|||
|
| :----: | :-----|
|
|||
|
| **Chinese name** | wavlink mesh.cgi命令执行漏洞(CVE-2022-2486) |
|
|||
|
| **CVSS core** | 9.8 |
|
|||
|
| **FOFA Query** (click to view the results directly)| [body="firstFlage"](https://fofa.info/result?qbase64=Ym9keT0iZmlyc3RGbGFnZSI%3D) |
|
|||
|
| **Number of assets affected** | 3078 |
|
|||
|
| **Description** | WAVLINK is a router developed by China Ruiyin Technology (WAVLINK) company. The system mesh.cgi file has a command execution vulnerability, and attackers can obtain server privileges through this vulnerability. Including models WN530HG4, WN531G3, WN572HG3, WN535G3, WN575A4, etc. |
|
|||
|
| **Impact** | Attackers can use this vulnerability to execute system commands to gain server privileges. |
|
|||
|
|
|||
|

|