A firmware update vulnerability exists in the login.cgi functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary firmware update. An attacker can send an unauthenticated message to trigger this vulnerability.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2036 | third party advisory exploit |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2036 | exploit third party advisory |