{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-10194","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-10-19T07:36:09.437Z","datePublished":"2024-10-20T08:00:06.181Z","dateUpdated":"2024-10-21T19:54:26.267Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-10-20T08:00:06.181Z"},"title":"WAVLINK WN530H4/WN530HG4/WN572HG3 Front-End Authentication Page login.cgi Goto_chidx stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"Stack-based Buffer Overflow"}]}],"affected":[{"vendor":"WAVLINK","product":"WN530H4","versions":[{"version":"20221028","status":"affected"}],"modules":["Front-End Authentication Page"]},{"vendor":"WAVLINK","product":"WN530HG4","versions":[{"version":"20221028","status":"affected"}],"modules":["Front-End Authentication Page"]},{"vendor":"WAVLINK","product":"WN572HG3","versions":[{"version":"20221028","status":"affected"}],"modules":["Front-End Authentication Page"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been classified as critical. Affected is the function Goto_chidx of the file login.cgi of the component Front-End Authentication Page. The manipulation of the argument wlanUrl leads to stack-based buffer overflow. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in WAVLINK WN530H4, WN530HG4 and WN572HG3 bis 20221028 ausgemacht. Dabei betrifft es die Funktion Goto_chidx der Datei login.cgi der Komponente Front-End Authentication Page. Mittels Manipulieren des Arguments wlanUrl mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei im lokalen Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:A/AC:L/Au:N/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-10-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-10-19T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-10-19T09:41:16.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Stellar Lab (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.280968","name":"VDB-280968 | WAVLINK WN530H4/WN530HG4/WN572HG3 Front-End Authentication Page login.cgi Goto_chidx stack-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.280968","name":"VDB-280968 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.422834","name":"Submit #422834 | wavlink WN530H4,WN530HG4,WN572HG3 WN530H4-WAVLINK_20220721,WN530HG4-WAVLINK_20220809,WN572HG3-WAVLINK_WO_20221028 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://docs.google.com/document/d/1PodIMRe1f0Ql83jUXV5VIoc-Xsf9VC1K","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"wavlink","product":"wn530h4","cpes":["cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"20221028","status":"affected"}]},{"vendor":"wavlink","product":"wn530hg4","cpes":["cpe:2.3:h:wavlink:wn530hg4:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"20221028","status":"affected"}]},{"vendor":"wavlink","product":"wn572hg3","cpes":["cpe:2.3:h:wavlink:wn572hg3:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"20221028","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-21T19:52:45.602669Z","id":"CVE-2024-10194","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-21T19:54:26.267Z"}}]}}