CVE-2023-29708

An issue was discovered in /cgi-bin/adm.cgi in WavLink WavRouter version RPT70HA1.x, allows attackers to force a factory reset via crafted payload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:android:*:*
cpe:2.3:a:wavlink:wavrouter_app:rpt70ha1.x:*:*:*:*:iphone_os:*:*

History

06 Dec 2024, 20:15

Type Values Removed Values Added
CWE CWE-863

21 Nov 2024, 07:57

Type Values Removed Values Added
References () https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - Third Party Advisory () https://github.com/shellpei/WAVLINK-Reset/blob/main/CVE-2023-29708 - Third Party Advisory
References () https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - Exploit, Third Party Advisory () https://holistic-height-e6d.notion.site/WAVLINK-Wi-Fi-APP-Arbitrary-factory-reset-vulnerability-b2d747693a7442aaa8b045e57bbd8297 - Exploit, Third Party Advisory

30 Jun 2023, 15:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 11:15

Updated : 2024-12-06 20:15


NVD link : CVE-2023-29708

Mitre link : CVE-2023-29708

CVE.ORG link : CVE-2023-29708


JSON object : View

Products Affected

wavlink

  • wavrouter_app
CWE
NVD-CWE-noinfo CWE-863

Incorrect Authorization