Description
A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.
Problem types
Product status
Timeline
| 2026-03-14: | Advisory disclosed |
| 2026-03-14: | VulDB entry created |
| 2026-03-14: | VulDB entry last update |
Credits
LtzHuster (VulDB User)
References
vuldb.com/?id.351070 (VDB-351070 | Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi command injection)
vuldb.com/?ctiid.351070 (VDB-351070 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.765327 (Submit #765327 | Wavlink WL-WN579A3 V220323 Command Injection)
vuldb.com/?submit.765328 (Submit #765328 | Wavlink WL-WN579A3 V220323 Command Injection (Duplicate))
github.com/...ng/vul_db/blob/main/WL-WN579A3/vul_9/README.md
github.com/...g/vul_db/blob/main/WL-WN579A3/vul_10/README.md
dl.wavlink.com/...-94f93d4-WO-mt7628-squashfs-sysupgrade.bin