Home

Description

A vulnerability was found in Wavlink WL-WN530H4 20220721. This vulnerability affects the function strcat/snprintf of the file /cgi-bin/internet.cgi. The manipulation results in os command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 2026.04.16 is able to resolve this issue. Upgrading the affected component is recommended.

PUBLISHED Reserved 2026-04-17 | Published 2026-04-17 | Updated 2026-04-17 | Assigner VulDB




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
HIGH: 7.2CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
8.3AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:OF/RC:C

Problem types

OS Command Injection

Command Injection

Product status

20220721
affected

2026.04.16
unaffected

Timeline

2026-04-17:Advisory disclosed
2026-04-17:VulDB entry created
2026-04-17:VulDB entry last update

Credits

ST4R (VulDB User) reporter

References

vuldb.com/vuln/358021 (VDB-358021 | Wavlink WL-WN530H4 internet.cgi snprintf os command injection) vdb-entry technical-description

vuldb.com/vuln/358021/cti (VDB-358021 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/783055 (Submit #783055 | https://github.com/dxz0069/WAVLINK-WN530H4-Command-Injection-in- WN530H4 (AC1200 Dual-Band Wi-Fi Router) Firmware: WN530H4-WAVLINK_20220721 Improper Neutralization of Special Elements used in an OS Comman) third-party-advisory

github.com/...d_routing/blob/main/vuldb_submission_report.md exploit

dl.wavlink.com/...re/RD/root_uImage_WN530H4-A_2026.04.16.bin patch

cve.org (CVE-2026-6483)

nvd.nist.gov (CVE-2026-6483)

Download JSON