Published:2023/06/27  Last Updated:2023/06/27

JVN#78634340
Multiple vulnerabilities in WAVLINK WL-WN531AX2

Overview

WL-WN531AX2 provided by WAVLINK TECHNOLOGY Ltd. contains multiple vulnerabilities.

Products Affected

  • WL-WN531AX2 firmware versions prior to 2023526

Description

WL-WN531AX2 provided by WAVLINK contains multiple vulnerabilities listed below.

  • Client-side enforcement of server-side security (CWE-602) - CVE-2023-32612
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8
    CVSS v2 AV:A/AC:L/Au:S/C:C/I:C/A:C Base Score: 7.7
  • Exposure of resource to wrong sphere (CWE-668) - CVE-2023-32613
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Base Score: 4.3
    CVSS v2 AV:A/AC:L/Au:N/C:P/I:N/A:N Base Score: 3.3
  • Improper authentication (CWE-287) - CVE-2023-32620
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score: 6.5
    CVSS v2 AV:A/AC:L/Au:N/C:P/I:N/A:N Base Score: 3.3
  • Unrestricted upload of file with dangerous type (CWE-434) - CVE-2023-32621
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N Base Score: 4.5
    CVSS v2 AV:A/AC:L/Au:S/C:N/I:C/A:N Base Score: 5.5
  • Improper neutralization of special elements (CWE-138) - CVE-2023-32622
    CVSS v3 CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score: 6.8
    CVSS v2 AV:A/AC:L/Au:S/C:P/I:P/A:P Base Score: 5.2

Impact

  • A logged-in user may execute OS commands with the root privilege - CVE-2023-32612, CVE-2023-32621, CVE-2023-32622
  • An attacker may use functions without logging in that should be available after login - CVE-2023-32613
  • An attacker may obtain a password for the wireless network - CVE-2023-32620

Solution

Update the firmware
Update the firmware to the latest version according to the information provided by the developer.
The developer addressed the vulnerability in the following version:

  • WL-WN531AX2 firmware version 2023526

Vendor Status

Vendor Link
WAVLINK TECHNOLOGY Ltd. Firmware Details and Download | Download for WL-WN531AX2

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2023-32612
CVE-2023-32613
CVE-2023-32620
CVE-2023-32621
CVE-2023-32622
JVN iPedia JVNDB-2023-000065