.. / CVE-2022-2486

Exploit for Wavlink WN535K2/WN535K3 - OS Command Injection (CVE-2022-2486)

Description:

Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade via manipulation of the argument key. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

Nuclei Template

View the template here CVE-2022-2486.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-2486.yaml
Copy

References:

https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20mesh.cgi.md
https://vuldb.com/?id.204537
https://github.com/ARPSyndicate/kenzer-templates
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2486
https://nvd.nist.gov/vuln/detail/CVE-2022-2486