CVE-2022-34046 Scanner
CVE-2022-34046 scanner - Information Disclosure vulnerability in Wavlink WN533A8
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
29 days
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
The Wavlink WN533A8 is a wireless range extender that is commonly used to extend the range of WiFi signals. This product is often used in homes and small offices where reliable WiFi connection is essential. It is designed to provide seamless coverage and eliminate dead zones, thereby enhancing the overall user experience. This device, however, has recently been found to have a critical vulnerability that puts its users at risk.
The CVE-2022-34046 vulnerability detected in the Wavlink WN533A8 range extender allows cyber attackers to gain access to users' usernames and passwords. This vulnerability can be easily exploited by accessing the URL http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);]. This leaves users' sensitive information vulnerable to theft and exploitation. This security flaw can put users at risk of identity theft, cyber attacks and other digital crimes.
If exploited, this vulnerability in the Wavlink WN533A8 can lead to serious consequences. For instance, cyber attackers can access sensitive information such as personal and financial data, compromising users' privacy and security. The information can be sold on the dark web, leading to loss of money, reputation, and privacy. Moreover, attackers can use the login credentials to impersonate the victim, launching phishing attacks and spreading malware.
With the pro features of the s4e.io platform, readers can quickly and easily learn about vulnerabilities that their digital assets may be subject to. Our platform provides up-to-date information on the latest security threats, enabling users to take appropriate measures to protect their digital assets. By subscribing to our platform, you can rest assured that your digital assets are secured against potential vulnerabilities and attacks.
REFERENCES