Published:2023/06/27 Last Updated:2023/06/27
JVN#78634340
Multiple vulnerabilities in WAVLINK WL-WN531AX2
Overview
WL-WN531AX2 provided by WAVLINK TECHNOLOGY Ltd. contains multiple vulnerabilities.
Products Affected
- WL-WN531AX2 firmware versions prior to 2023526
Description
WL-WN531AX2 provided by WAVLINK contains multiple vulnerabilities listed below.
- Client-side enforcement of server-side security (CWE-602) - CVE-2023-32612
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8 CVSS v2 AV:A/AC:L/Au:S/C:C/I:C/A:C Base Score: 7.7 - Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32613
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score: 4.3 CVSS v2 AV:A/AC:L/Au:N/C:P/I:N/A:N Base Score: 3.3 - Improper authentication (CWE-287) - CVE-2023-32620
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 6.5 CVSS v2 AV:A/AC:L/Au:N/C:P/I:N/A:N Base Score: 3.3 - Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-32621
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N Base Score: 4.5 CVSS v2 AV:A/AC:L/Au:S/C:N/I:C/A:N Base Score: 5.5 - Improper neutralization of special elements (CWE-138) - CVE-2023-32622
CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8 CVSS v2 AV:A/AC:L/Au:S/C:P/I:P/A:P Base Score: 5.2
Impact
- A logged-in user may execute OS commands with the root privilege - CVE-2023-32612, CVE-2023-32621, CVE-2023-32622
- An attacker may use functions without logging in that should be available after login - CVE-2023-32613
- An attacker may obtain a password for the wireless network - CVE-2023-32620
Solution
Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
The developer addressed the vulnerability in the following version:
- WL-WN531AX2 firmware version 2023526
Vendor Status
Vendor | Link |
WAVLINK TECHNOLOGY Ltd. | Firmware Details and Download | Download for WL-WN531AX2 |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2023-32612 |
CVE-2023-32613 |
|
CVE-2023-32620 |
|
CVE-2023-32621 |
|
CVE-2023-32622 |
|
JVN iPedia |
JVNDB-2023-000065 |