CVE-2022-48166
📋 TL;DR
This vulnerability in Wavlink WL-WN530HG4 routers allows unauthenticated attackers to download configuration files and log files containing admin credentials. It affects users of this specific router model with vulnerable firmware. Attackers can gain administrative access to the router without authentication.
💻 Affected Systems
- Wavlink WL-WN530HG4
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full administrative control of the router, enabling them to intercept traffic, modify network settings, install malware, or pivot to internal networks.
Likely Case
Attackers steal admin credentials and configuration data, potentially compromising the entire network and exposing sensitive information.
If Mitigated
With proper network segmentation and access controls, impact is limited to the router itself, though credentials would still be exposed.
🎯 Exploit Status
Exploitation requires simple HTTP requests to specific endpoints; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
Check Wavlink website for firmware updates. If available, download and install via router admin interface.
🔧 Temporary Workarounds
Block External Access
allDisable WAN access to router admin interface
Configure firewall to block incoming connections to router IP on ports 80/443
Change Admin Credentials
allChange router admin password immediately
Login to router admin interface and change admin password
🧯 If You Can't Patch
- Replace affected router with a different model
- Isolate router in separate VLAN with strict access controls
🔍 How to Verify
Check if Vulnerable:
Attempt HTTP GET request to router IP at /cgi-bin/ExportAllSettings.sh endpoint without authentication
Check Version:
Check router web interface or use nmap to identify firmware version
Verify Fix Applied:
Verify same request returns authentication error or 404 after firmware update
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /cgi-bin/ExportAllSettings.sh
- Multiple failed login attempts followed by successful access
Network Indicators:
- Unusual outbound traffic from router
- External IP accessing router admin interface
SIEM Query:
source_ip="router_ip" AND (url_path="/cgi-bin/ExportAllSettings.sh" OR url_path="/cgi-bin/ExportLogs.sh")
🔗 References
- https://docs.google.com/document/d/1zvbuu3Hkk3CAkojAivlUESvtHblHJNLJdpGOoNtk-Vo/edit?usp=sharing
- https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK%20WN530HG4.md
- https://docs.google.com/document/d/1zvbuu3Hkk3CAkojAivlUESvtHblHJNLJdpGOoNtk-Vo/edit?usp=sharing
- https://github.com/strik3r0x1/Vulns/blob/main/WAVLINK%20WN530HG4.md