Command Injection Vulnerability in Wavlink AC3000 Router
CVE-2024-39783

9.1CRITICAL

Key Information:

Vendor

Wavlink

Vendor
CVE Published:
14 January 2025

What is CVE-2024-39783?

The Wavlink AC3000 M33A8 router contains multiple OS command injection vulnerabilities within the adm.cgi sch_reboot() functionality. These vulnerabilities allow attackers to execute arbitrary code by crafting malicious HTTP requests. Specifically, exploiting the 'restart_week' POST parameter can lead to unauthorized actions on the device, enabling an attacker with required authentication to compromise the router's integrity and potentially access sensitive information.

Affected Version(s)

Wavlink AC3000 M33A8.V5030.210505

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.