.. / CVE-2022-34046

Exploit for WAVLINK WN533A8 - Improper Access Control (CVE-2022-34046)

Description:

WAVLINK WN533A8 M33A8.V5030.190716 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

Nuclei Template

View the template here CVE-2022-34046.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-34046.yaml
Copy

References:

https://drive.google.com/file/d/18ECQEqZ296LDzZ0wErgqnNfen1jCn0mG/view?usp=sharing
http://packetstormsecurity.com/files/167890/Wavlink-WN533A8-Password-Disclosure.html
https://github.com/ARPSyndicate/cvemon
https://nvd.nist.gov/vuln/detail/CVE-2022-34046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34046