Incorrect Access Control in WAVLINK WN530H4

This vulnerability is an Incorrect Access Control in the WAVLINK WN530H4 router.

Otherwise known as an Authentication Bypass Vulnerability, this vulnerability allowed an unauthenticated user to access arbitrary endpoints in /cgi-bin/ without being logged into the router interface. The following endpoints were vulnerable to this error:

  • /cgi-bin/ExportAllSettings.sh
  • /cgi-bin/ExportLogs.sh
  • /cgi-bin/live_api.cgi
  • /cgi-bin/makeRequest.cgi

The endpoint /cgi-bin/adm.cgi was not vulnerable to this attack.

Profile picture
CHRIS CERNE

Christopher Cerne is a Senior Security Consultant at Stratum Security with over a decade of experience in technology. His passion for computers began in elementary school, evolving into a career focused on identifying security issues in code. After studying embedded device security at Virginia Tech, Christopher now specializes in conducting security reviews and threat modeling for externally facing applications.

Connect

Made with ❤️ by Chris Cerne © 2025