CVE-2022-2488

WAVLINK WN535K2/WN535K3 touchlist_sync.cgi os command injection

Basic Information

CVE State
PUBLISHED
Reserved Date
July 20, 2022
Published Date
July 20, 2022
Last Updated
April 15, 2025
Vendor
WAVLINK
Product
WN535K2, WN535K3
Description
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

8.0 - HIGH

Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

Score
94.14% (Percentile: 99.90%) as of 2025-07-29

SSVC Information

Exploitation
poc
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-07-06 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-07-07 12:01:16 UTC

Scanner Integrations

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel