Description
A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting. Remote exploitation of the attack is possible. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Problem types
Product status
Timeline
| 2026-04-18: | Advisory disclosed |
| 2026-04-18: | VulDB entry created |
| 2026-04-18: | VulDB entry last update |
Credits
LtzHust2 (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/358196 (VDB-358196 | Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting)
vuldb.com/vuln/358196/cti (VDB-358196 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/785303 (Submit #785303 | Wavlink WL-WN579A3 V220323 Cross Site Scripting)
github.com/...g/vul_db/blob/main/WL-WN579A3/vul_16/README.md
dl.wavlink.com/...-94f93d4-WO-mt7628-squashfs-sysupgrade.bin