WAVLINK Vulnerability: Stack-Based Buffer Overflow in Front-End Authentication Page
CVE-2024-10194

8.8HIGH

Key Information:

Vendor
Wavlink
Status
Wn530h4
Wn530hg4
Wn572hg3
Vendor
CVE Published:
20 October 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A vulnerability exists in the front-end authentication component of WAVLINK WN530H4, WN530HG4, and WN572HG3 routers, specifically within the login.cgi file. The flaw occurs in the Goto_chidx function, where improper handling of the wlanUrl argument can trigger a stack-based buffer overflow. This vulnerability can be exploited exclusively within the local network, potentially allowing malicious actors to execute arbitrary code or disrupt service. Despite early notification to the vendor regarding this issue, no response or mitigation has been communicated.

Affected Version(s)

WN530H4 20221028

WN530HG4 20221028

WN572HG3 20221028

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stellar Lab (VulDB User)
.