.. / CVE-2022-34047

Exploit for WAVLINK WN530HG4 - Improper Access Control (CVE-2022-34047)

Description:

WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations.

Nuclei Template

View the template here CVE-2022-34047.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-34047.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34047
https://nvd.nist.gov/vuln/detail/CVE-2022-34047
https://drive.google.com/file/d/1sTQdUc12aZvJRFeb5wp8AfPdUEkkU9Sy/view?usp=sharing