Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_week` POST parameter.
#BUGBOUNTY

Top auditors compete to keep high severity bugs out of production. Start a public or private audit within 48 hours.

Compete against the world's top crypto security experts and make a name for yourself.

Awesome write-ups from the world’s best hackers intopics ranging from bug bounties, CTFs, Hack the box walkthroughs, hardware challenges, and real-life encounters.

Microsoft offers cash awards for finding and reporting certain types of vulnerabilities and exploitation techniques.

Explore YesWeHack, leading global Bug Bounty & Vulnerability Management Platform. Connect with tens of thousands of ethical hackers worldwide to uncover vulnerabilities in your websites, mobile apps, and digital infrastructure, bolstering your cyber defense strategy.

On Immunefi, hackers secure web3, save funds from theft, and get paid the world's largest bug bounties.

The world’s first bug bounty platform for AI/ML. huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications, including those powered by Open Source Software (OSS).

Bugcrowd teams with elite security researchers to reduce risk & improve security ROI through our bug bounty, pen testing, & vulnerability disclosure programs.

Bug bounty and agile penetration testing solutions powered by Europe's leading network of ethical hackers.

The world's best dynamic repository for security vulnerabilities.

Lock unto your next target, bounty hunter! Browse through the latest hacktivity to keep your bug hunting ongoing and find the contact information to report your findings to them. You can even save your targets for later.

The CodeQL Bug Bounty program operated by the GitHub Security Lab aims at scaling the security research community’s work across open source projects. The All For One protects against future vulnerabilities by coding and eradicating a pattern, while the Bug Slayer fixes existing occurrences of this pattern. A bounty hunter can apply to both programs sequentially to maximize their positive impact on open source projects, and their gain.

Reduce the risk of a security incident by working with the world’s largest community of trusted ethical hackers. HackerOne offers bug bounty, VDP, security assessments, attack surface management, and pentest solutions.

Expert Bug Bounty Platform for Crypto Projects.

Welcome to Google's Bug Hunting community, learn more about hunting & reporting bugs you’ve found in Google products.