Vulnerability Details : CVE-2022-40622
Potential exploit
The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.
Vulnerability category: BypassGain privilege
Products affected by CVE-2022-40622
- cpe:2.3:o:wavlink:wn531g3_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-40622
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-40622
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-40622
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
-
The product implements an authentication technique, but it skips a step that weakens the technique.Assigned by: cve@rapid7.con (Secondary)
References for CVE-2022-40622
-
https://youtu.be/cSileV8YbsQ?t=655
Reversing the Wavlink Quantum D4G wireless router - YouTubeExploit;Third Party Advisory
Jump to