.. / CVE-2022-2487

Exploit for Wavlink WN535K2/WN535K3 - OS Command Injection (CVE-2022-2487)

Description:

Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection which affects unknown code in /cgi-bin/nightled.cgi via manipulation of the argument start_hour. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

Nuclei Template

View the template here CVE-2022-2487.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-2487.yaml
Copy

References:

https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20nightled.cgi%20.md
https://nvd.nist.gov/vuln/detail/CVE-2022-2487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2487
https://vuldb.com/?id.204538