CVE-2022-31847 Scanner
Detects 'Information Disclosure' vulnerability in WAVLINK WN579 X3 affects v. M79X3.V5030.180719.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 second
Time Interval
3 month
Scan only one
Url
Toolbox
-
The WAVLINK WN579 X3 is a wireless router that is commonly used in households and small businesses. This router is designed to provide high-speed internet connectivity to multiple devices simultaneously. It operates on the 802.11ac standard and supports dual-band connections, which allows for faster and more efficient internet speeds.
Recently, a vulnerability was detected in this router, identified as CVE-2022-31847. This vulnerability is located in the ExportAllSettings.sh file, which is part of the router's cgi-bin functionality. Upon receiving a crafted POST request, attackers can exploit this vulnerability and gain access to sensitive information that is stored on the router.
The exploitation of this vulnerability can lead to significant consequences for the affected users. Attackers can access important router settings and information, including wireless network names, passwords, and configurations. This can result in data breaches, unauthorized access, and network infections, among other issues. The affected users can also suffer from financial losses, reputational damage, and loss of productivity.
Thanks to the pro features of the s4e.io platform, users can quickly and easily stay informed about vulnerabilities in their digital assets. By subscribing to this platform, users can receive alerts and notifications about new vulnerabilities, as well as get access to comprehensive vulnerability data that can help them assess and mitigate security risks. With this platform, users can take proactive measures and protect their digital assets from potential threats.
REFERENCES