Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter.
History

Tue, 14 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 14:30:00 +0000

Type Values Removed Values Added
Description Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter.
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published: 2025-01-14T14:21:25.806Z

Updated: 2025-01-14T15:22:52.766Z

Reserved: 2024-06-28T16:07:58.453Z

Link: CVE-2024-39783

cve-icon Vulnrichment

Updated: 2025-01-14T15:22:49.835Z

cve-icon NVD

Status : Received

Published: 2025-01-14T15:15:23.253

Modified: 2025-01-14T15:15:23.253

Link: CVE-2024-39783

cve-icon Redhat

No data.