A vulnerability was found in Wavlink AC3000 M33A8.V5030.210505 and classified as critical. This issue affects the function set_ledonoff of the file adm.cgi. Executing manipulation can lead to command injection.
This vulnerability is handled as CVE-2024-37186. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as critical has been reported in Wavlink AC3000 M33A8.V5030.210505. The affected element is the function set_smb_cfg of the file nas.cgi. Performing manipulation results in external control of system or configuration setting.
This vulnerability is identified as CVE-2024-39280. The attack can be initiated remotely. There is not any exploit available.
A vulnerability described as critical has been identified in Wavlink AC3000 M33A8.V5030.210505. The impacted element is the function openvpn_client_setup of the file openvpn.cgi. Executing manipulation can lead to external control of system or configuration setting.
This vulnerability is tracked as CVE-2024-38666. The attack can be launched remotely. No exploit exists.
A vulnerability classified as critical has been found in Wavlink AC3000 M33A8.V5030.210505. This affects the function set_wzdgw4G of the file adm.cgi. The manipulation leads to buffer overflow.
This vulnerability is listed as CVE-2024-39294. The attack may be initiated remotely. There is no available exploit.