CVE-2022-34047
📋 TL;DR
This vulnerability allows unauthenticated attackers to access sensitive configuration files on Wavlink WN530HG4 routers, exposing administrator usernames and passwords. Attackers can exploit this by accessing a specific URL and extracting credentials from JavaScript variables. All users of affected WN530HG4 routers with vulnerable firmware are at risk.
💻 Affected Systems
- Wavlink WN530HG4
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control of the router, enabling network traffic interception, device reconfiguration, malware deployment, and lateral movement to connected devices.
Likely Case
Attackers steal administrator credentials and use them to modify router settings, change DNS configurations, or monitor network traffic.
If Mitigated
With proper network segmentation and access controls, impact is limited to the router itself, though credential exposure still poses significant risk.
🎯 Exploit Status
Exploitation requires only web browser access to the router's management interface and basic JavaScript knowledge.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Check Wavlink website for firmware updates. If unavailable, implement workarounds or replace device.
🔧 Temporary Workarounds
Disable Remote Management
allPrevent external access to router management interface
Access router settings > Administration > Remote Management > Disable
Change Default Credentials
allUse strong, unique passwords even if exposed, as they may be changed before exploitation
Access router settings > Administration > Change Password
🧯 If You Can't Patch
- Segment affected routers on isolated network segments
- Implement strict firewall rules to limit access to router management interface
🔍 How to Verify
Check if Vulnerable:
Access http://[ROUTER_IP]/set_safety.shtml?r=52300 and view page source. Search for 'var syspasswd' - if found with credentials, device is vulnerable.
Check Version:
Access router web interface > Status > Firmware Version
Verify Fix Applied:
After firmware update or workaround implementation, repeat the check above. Credentials should not be exposed in page source.
📡 Detection & Monitoring
Log Indicators:
- Unusual access to /set_safety.shtml?r=52300
- Multiple failed login attempts followed by successful login
Network Indicators:
- External IP addresses accessing router management port (typically 80/443)
- Unusual traffic patterns from router
SIEM Query:
source_ip=EXTERNAL AND dest_port=80 AND uri_path="/set_safety.shtml?r=52300"
🔗 References
- http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html
- https://drive.google.com/file/d/1sTQdUc12aZvJRFeb5wp8AfPdUEkkU9Sy/view?usp=sharing
- http://packetstormsecurity.com/files/167891/Wavlink-WN530HG4-Password-Disclosure.html
- https://drive.google.com/file/d/1sTQdUc12aZvJRFeb5wp8AfPdUEkkU9Sy/view?usp=sharing