A vulnerability was found in Wavlink AC3000 M33A8.V5030.210505 and classified as critical. This issue affects the function set_ledonoff of the file adm.cgi. Executing manipulation can lead to command injection.
This vulnerability is handled as CVE-2024-37186. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in Wavlink AC3000 M33A8.V5030.210505. The affected element is the function set_smb_cfg of the file nas.cgi. Performing manipulation results in external control of system or configuration setting.
This vulnerability is identified as CVE-2024-39280. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in Wavlink AC3000 M33A8.V5030.210505. The impacted element is the function openvpn_client_setup of the file openvpn.cgi. Executing manipulation can lead to external control of system or configuration setting.
This vulnerability is tracked as CVE-2024-38666. The attack can be launched remotely. No exploit exists.
A vulnerability classified as critical has been found in Wavlink AC3000 M33A8.V5030.210505. This affects the function set_wzdgw4G of the file adm.cgi. The manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2024-39294. The attack may be initiated remotely. There is no available exploit.
A vulnerability classified as critical was found in Wavlink AC3000 M33A8.V5030.210505. This impacts the function qos_sta_settings of the file qos.cgi. The manipulation results in buffer overflow.
This vulnerability is cataloged as CVE-2024-39299. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as critical, has been found in Wavlink AC3000 M33A8.V5030.210505. Affected is the function set_TR069 of the file adm.cgi. This manipulation causes buffer overflow.
This vulnerability is registered as CVE-2024-37357. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability, which was classified as critical, was found in Wavlink AC3000 M33A8.V5030.210505. Affected by this vulnerability is the function set_wzap of the file adm.cgi. Such manipulation leads to buffer overflow.
This vulnerability is documented as CVE-2024-39358. The attack can be executed remotely. There is not any exploit available.
A vulnerability has been found in Wavlink AC3000 M33A8.V5030.210505 and classified as critical. Affected by this issue is some unknown functionality of the file fw_check.sh. Performing manipulation results in missing authentication.
This vulnerability is reported as CVE-2024-39273. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability was found in Wavlink AC3000 M33A8.V5030.210505 and classified as critical. This affects the function SetName of the file wireless.cgi. Executing manipulation can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2024-39357. The attack may be performed from a remote location. There is no available exploit.