Home

Description

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

PUBLISHED Reserved 2026-03-14 | Published 2026-03-14 | Updated 2026-03-17 | Assigner VulDB




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

Problem types

Command Injection

Injection

Product status

220323
affected

Timeline

2026-03-14:Advisory disclosed
2026-03-14:VulDB entry created
2026-03-14:VulDB entry last update

Credits

LtzHuster (VulDB User) reporter

References

vuldb.com/?id.351070 (VDB-351070 | Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi command injection) vdb-entry technical-description

vuldb.com/?ctiid.351070 (VDB-351070 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.765327 (Submit #765327 | Wavlink WL-WN579A3 V220323 Command Injection) third-party-advisory

vuldb.com/?submit.765328 (Submit #765328 | Wavlink WL-WN579A3 V220323 Command Injection (Duplicate)) third-party-advisory

github.com/...ng/vul_db/blob/main/WL-WN579A3/vul_9/README.md related

github.com/...g/vul_db/blob/main/WL-WN579A3/vul_10/README.md exploit

dl.wavlink.com/...-94f93d4-WO-mt7628-squashfs-sysupgrade.bin patch

cve.org (CVE-2026-4163)

nvd.nist.gov (CVE-2026-4163)

Download JSON