Wavlink AC1200 with firmware versions M32A3_V1410_230602 and M32A3_V1410_240222 are vulnerable to a post-authentication command injection while resetting the password. This vulnerability is specifically found within the "set_sys_adm" function of the "adm.cgi" binary, and is due to improper santization of the user provided "newpass" field
References
| Link | Resource |
|---|---|
| http://wavlink.com | Product |
| https://github.com/L41KAA/CVE-2024-48705 | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-02 15:15
Updated : 2025-09-04 17:47
NVD link : CVE-2024-48705
Mitre link : CVE-2024-48705
CVE.ORG link : CVE-2024-48705
JSON object : View
Products Affected
wavlink
- wl-wn531p3
- wl-wn531p3_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
