CVE-2022-34047

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to access sensitive configuration files on Wavlink WN530HG4 routers, exposing administrator usernames and passwords. Attackers can exploit this by accessing a specific URL and extracting credentials from JavaScript variables. All users of affected WN530HG4 routers with vulnerable firmware are at risk.

💻 Affected Systems

Products:
  • Wavlink WN530HG4
Versions: M30HG4.V5030.191116
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of the router, enabling network traffic interception, device reconfiguration, malware deployment, and lateral movement to connected devices.

🟠

Likely Case

Attackers steal administrator credentials and use them to modify router settings, change DNS configurations, or monitor network traffic.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the router itself, though credential exposure still poses significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web browser access to the router's management interface and basic JavaScript knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Check Wavlink website for firmware updates. If unavailable, implement workarounds or replace device.

🔧 Temporary Workarounds

Disable Remote Management

all

Prevent external access to router management interface

Access router settings > Administration > Remote Management > Disable

Change Default Credentials

all

Use strong, unique passwords even if exposed, as they may be changed before exploitation

Access router settings > Administration > Change Password

🧯 If You Can't Patch

  • Segment affected routers on isolated network segments
  • Implement strict firewall rules to limit access to router management interface

🔍 How to Verify

Check if Vulnerable:

Access http://[ROUTER_IP]/set_safety.shtml?r=52300 and view page source. Search for 'var syspasswd' - if found with credentials, device is vulnerable.

Check Version:

Access router web interface > Status > Firmware Version

Verify Fix Applied:

After firmware update or workaround implementation, repeat the check above. Credentials should not be exposed in page source.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to /set_safety.shtml?r=52300
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • External IP addresses accessing router management port (typically 80/443)
  • Unusual traffic patterns from router

SIEM Query:

source_ip=EXTERNAL AND dest_port=80 AND uri_path="/set_safety.shtml?r=52300"

🔗 References

📤 Share & Export