WAVLINK WN551K1 found a command injection vulnerability through the IP parameter of /cgi-bin/touchlist_sync.cgi.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:wavlink:wn551k1_firmware:20210427:*:*:*:*:*:*:* | |
| Metrics |
ssvc
|
Fri, 06 Jun 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wn551k1 Wavlink wn551k1 Firmware |
|
| CPEs | cpe:2.3:h:wavlink:wn551k1:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wn551k1_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wavlink
Wavlink wn551k1 Wavlink wn551k1 Firmware |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T04:19:20.415Z
Reserved: 2024-06-21T00:00:00.000Z
Link: CVE-2024-38894
Updated: 2024-08-02T04:19:20.415Z
Status : Analyzed
Published: 2024-06-24T21:15:26.137
Modified: 2025-06-06T17:16:55.567
Link: CVE-2024-38894
No data.
OpenCVE Enrichment
No data.
Weaknesses