Ad

CVE-2024-39801

HIGH CVSS 3.1: 7.2 EPSS 0.47%
Updated Nov 03, 2025
Wavlink
Parameter Value
CVSS 7.2 (HIGH)
Type CWE-120 (Buffer Copy without Checking Size)
Vendor Wavlink
Public PoC No

Multiple buffer overflow vulnerabilities exist in the qos.cgi qos_settings() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A buffer overflow vulnerability exists in the `qos_bandwidth` POST parameter.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
High
Admin privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 2

Configuration From (including) Up to (excluding)
Wavlink Wl-Wn533a8_Firmware
cpe:2.3:o:wavlink:wl-wn533a8_firmware:m33a8.v5030.210505:*:*:*:*:*:*:*
Wavlink Wl-Wn533a8
cpe:2.3:h:wavlink:wl-wn533a8:-:*:*:*:*:*:*:*