.. / CVE-2022-48165

Exploit for Wavlink - Improper Access Control (CVE-2022-48165)

Description:

Wavlink WL-WN530H4 M30H4.V5030.210121 is susceptible to improper access control in the component /cgi-bin/ExportLogs.sh. An attacker can download configuration data and log files, obtain admin credentials, and potentially execute unauthorized operations.

Nuclei Template

View the template here CVE-2022-48165.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-48165.yaml
Copy

References:

https://docs.google.com/document/d/1HD4GKumkZpa6FNHuf0QQSKFvoYhCfwXpbyWiJdx1VtE
https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK_WL-WN530H4.md
https://twitter.com/For3stCo1d/status/1622576544190464000
https://nvd.nist.gov/vuln/detail/CVE-2022-48165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48165