vendor:
WN533A8
by:
Ahmed Alroky
6.1
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: WN533A8
Affected Version From: M33A8.V5030.190716
Affected Version To: M33A8.V5030.190716
Patch Exists: NO
Related CWE: CVE-2022-34048
CPE: a:wavlink:wn533a8
Tags: cve2022,wavlink,xss,router,edb,cve
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.html:"Wavlink"', 'verified': True, 'vendor': 'wavlink', 'product': 'wn533a8_firmware'}
Platforms Tested: Windows
2020
Wavlink WN533A8 – Cross-Site Scripting (XSS)
A Cross-Site Scripting (XSS) vulnerability exists in Wavlink WN533A8, which allows an attacker to inject malicious JavaScript code into the application. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is due to insufficient validation of user-supplied input in the 'login_page' parameter of the 'login.cgi' script. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable server.
Mitigation:
Input validation should be used to prevent Cross-Site Scripting (XSS) attacks. The application should validate all input data for length, type, and syntax. All HTML metacharacters should be removed or encoded before being returned to the user.