Home

Description

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component.

PUBLISHED Reserved 2026-03-14 | Published 2026-03-15 | Updated 2026-03-17 | Assigner VulDB




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.0AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C

Problem types

Command Injection

Injection

Product status

221110
affected

Timeline

2026-03-14:Advisory disclosed
2026-03-14:VulDB entry created
2026-03-14:VulDB entry last update

Credits

LtzHust (VulDB User) reporter

References

vuldb.com/?id.351071 (VDB-351071 | Wavlink WL-WN578W2 POST Request wireless.cgi GuestWifi command injection) vdb-entry technical-description

vuldb.com/?ctiid.351071 (VDB-351071 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.768292 (Submit #768292 | Wavlink WL-WN578W2 V221110 Command Injection) third-party-advisory

vuldb.com/?submit.768293 (Submit #768293 | Wavlink WL-WN578W2 V221110 Command Injection (Duplicate)) third-party-advisory

vuldb.com/?submit.768294 (Submit #768294 | Wavlink WL-WN578W2 V221110 Command Injection (Duplicate)) third-party-advisory

github.com/...ng/vul_db/blob/main/WL-WN578W2/vul_1/README.md related

github.com/...ng/vul_db/blob/main/WL-WN578W2/vul_2/README.md exploit

dl.wavlink.com/...-94f93d4-WO-mt7628-squashfs-sysupgrade.bin patch

cve.org (CVE-2026-4164)

nvd.nist.gov (CVE-2026-4164)

Download JSON