Description
A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown function of the file /cgi-bin/login.cgi. Executing a manipulation of the argument key can lead to command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2026-02-15: | Advisory disclosed |
| 2026-02-15: | VulDB entry created |
| 2026-02-20: | VulDB entry last update |
Credits
kdb3169 (VulDB User)
References
vuldb.com/?id.346115 (VDB-346115 | Wavlink WL-WN579A3 login.cgi command injection)
vuldb.com/?ctiid.346115 (VDB-346115 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.748074 (Submit #748074 | Wavlink WN579A3 20210219 Command Injection)
github.com/...ra/IoT-Vuls/blob/main/wavlink/wn579a3/login.md