{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3380","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-06-23T09:14:21.253Z","datePublished":"2023-06-23T09:31:03.911Z","dateUpdated":"2024-08-02T06:55:03.103Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-23T13:39:18.352Z"},"title":"Wavlink WN579X3 Ping Test adm.cgi injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"CWE-74 Injection"}]}],"affected":[{"vendor":"Wavlink","product":"WN579X3","versions":[{"version":"20230615","status":"affected"}],"modules":["Ping Test"]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Wavlink WN579X3 up to 20230615. Affected is an unknown function of the file /cgi-bin/adm.cgi of the component Ping Test. The manipulation of the argument pingIp leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-232236. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Wavlink WN579X3 bis 20230615 entdeckt. Hiervon betroffen ist ein unbekannter Codeblock der Datei /cgi-bin/adm.cgi der Komponente Ping Test. Durch Manipulation des Arguments pingIp mit unbekannten Daten kann eine injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-06-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-06-23T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-06-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-07-17T17:37:03.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"WWesleywww (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.232236","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.232236","tags":["signature","permissions-required"]},{"url":"https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:55:03.103Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.232236","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.232236","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/sleepyvv/vul_report/blob/main/WAVLINK/WAVLINK-WN579X3-RCE.md","tags":["exploit","x_transferred"]}]}]}}