Description
A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine Schwachstelle in Wavlink WL-WN578W2 221110 entdeckt. Das betrifft die Funktion sub_409184 der Datei /wizard_rep.shtml. Die Bearbeitung des Arguments sel_EncrypTyp verursacht command injection. Der Angriff kann über das Netzwerk angegangen werden. Die Ausnutzung wurde veröffentlicht und kann verwendet werden.
Problem types
Product status
Timeline
| 2025-09-12: | Advisory disclosed |
| 2025-09-12: | VulDB entry created |
| 2025-09-12: | VulDB entry last update |
Credits
n0ps1ed (VulDB User)
References
vuldb.com/?id.323749 (VDB-323749 | Wavlink WL-WN578W2 wizard_rep.shtml sub_409184 command injection)
vuldb.com/?ctiid.323749 (VDB-323749 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.643434 (Submit #643434 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection)
github.com/...in/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml