Wavlink M86X3A_V240730 contains a buffer overflow vulnerability in the /cgi-bin/ExportAllSettings.cgi file. The vulnerability arises because the Cookie parameter does not properly validate the length of input data. Attackers can exploit this to execute arbitrary code or cause a denial of service (DoS) on the system
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 26 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 | |
Metrics |
cvssV3_1
|
Fri, 26 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Wavlink M86X3A_V240730 contains a buffer overflow vulnerability in the /cgi-bin/ExportAllSettings.cgi file. The vulnerability arises because the Cookie parameter does not properly validate the length of input data. Attackers can exploit this to execute arbitrary code or cause a denial of service (DoS) on the system | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-26T20:38:20.630Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-55847

Updated: 2025-09-26T20:38:16.545Z

Status : Received
Published: 2025-09-26T18:15:36.367
Modified: 2025-09-26T21:15:36.090
Link: CVE-2025-55847

No data.

No data.