.. / CVE-2022-2488

Exploit for Wavlink WN535K2/WN535K3 - OS Command Injection (CVE-2022-2488)

Description:

Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in /cgi-bin/touchlist_sync.cgi via manipulation of the argument IP. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.

Nuclei Template

View the template here CVE-2022-2488.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-2488.yaml
Copy

References:

https://vuldb.com/?id.204539
https://github.com/1angx/webray.com.cn/blob/main/Wavlink/Wavlink%20touchlist_sync.cgi.md
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2488
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2022-2488