CVE-2022-31308
📋 TL;DR
This vulnerability in WAVLINK AERIAL X 1200M routers allows attackers to execute commands via the live_mfg.shtml page, exposing sensitive router information. Attackers can exploit this to gain unauthorized access to configuration details and potentially control the device. Users of affected WAVLINK router models with vulnerable firmware are at risk.
💻 Affected Systems
- WAVLINK AERIAL X 1200M M79X3
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control of the router, intercept network traffic, deploy malware to connected devices, and use the router as a pivot point into internal networks.
Likely Case
Attackers extract sensitive router configuration information, credentials, and network details, enabling further attacks or unauthorized access.
If Mitigated
With proper network segmentation and access controls, impact is limited to the router itself without lateral movement to other systems.
🎯 Exploit Status
The GitHub reference shows detailed exploitation methods. Attack requires network access to the router's web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
1. Check WAVLINK website for firmware updates
2. If update available, download and install via router admin interface
3. Verify the live_mfg.shtml page is no longer accessible or vulnerable
🔧 Temporary Workarounds
Disable remote administration
allPrevent external access to router web interface
Login to router admin > Advanced Settings > Remote Management > Disable
Block access to live_mfg.shtml
linuxUse firewall rules to block access to vulnerable endpoint
iptables -A INPUT -p tcp --dport 80 -m string --string "live_mfg.shtml" --algo bm -j DROP
🧯 If You Can't Patch
- Segment router on isolated network segment
- Implement strict firewall rules limiting access to router management interface
🔍 How to Verify
Check if Vulnerable:
Access http://[router-ip]/live_mfg.shtml?exec_cmd=ls and check if command output is returned
Check Version:
Login to router admin interface and check Firmware Version in System Status
Verify Fix Applied:
Attempt the same access and verify no command execution occurs and page returns error or is inaccessible
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /live_mfg.shtml with exec_cmd parameter
- Unusual command execution in router logs
Network Indicators:
- HTTP traffic to router IP on port 80/443 with exec_cmd parameter in URL
SIEM Query:
source="router_logs" AND url="*live_mfg.shtml*exec_cmd*"