Security for everyone

CVE-2022-31845 Scanner

Detects 'Information Disclosure' vulnerability in WAVLINK WN535 G3 affects v. M35G3R.V5030.180927.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-31845 Scanner Detail

The WAVLINK WN535 G3 is a popular wireless router used in small to medium sized businesses and homes. The router is commonly used to provide high-speed wireless internet connectivity and can support multiple devices simultaneously. With its compact design and advanced features, it has become a favorite among users who demand speed, reliability, and security.

A recently discovered vulnerability,called CVE-2022-31845, has put the routers at risk. The flaw specifically targets the live_check.shtml of WAVLINK WN535 G3 M35G3R.V5030.180927 and can be exploited by hackers to gain sensitive information. This information might include login credentials or other details that can allow them to take control of the router.

When the vulnerability is exploited, the hackers can gain access to sensitive information, leading to several impacts. For instance, malicious actors can monitor your internet activity, steal your personal data, or change network settings that could impact your network infrastructure. Additionally, an attacker can use your router as a point of entry into the rest of the network, thus compromising other devices connected to it.

In conclusion, the WAVLINK WN535 G3 router is a functional and useful device that has become indispensable in today's digital world. However, it is important to be aware of the vulnerabilities that can put your digital assets at risk. By taking precautions and staying updated on current threats, YOU can keep your digital assets safe. With platform, you can have access to information regarding vulnerabilities and steps to mitigate them. Protecting your devices and networks is now simpler and more efficient than ever before.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture