WAVLINK Vulnerability: Stack-Based Buffer Overflow in Front-End Authentication Page
CVE-2024-10194
Key Information:
- Vendor
- Wavlink
- Status
- Wn530h4
- Wn530hg4
- Wn572hg3
- Vendor
- CVE Published:
- 20 October 2024
Badges
Summary
A vulnerability exists in the front-end authentication component of WAVLINK WN530H4, WN530HG4, and WN572HG3 routers, specifically within the login.cgi file. The flaw occurs in the Goto_chidx function, where improper handling of the wlanUrl argument can trigger a stack-based buffer overflow. This vulnerability can be exploited exclusively within the local network, potentially allowing malicious actors to execute arbitrary code or disrupt service. Despite early notification to the vendor regarding this issue, no response or mitigation has been communicated.
Affected Version(s)
WN530H4 20221028
WN530HG4 20221028
WN572HG3 20221028
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved