Home

Description

A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting. Remote exploitation of the attack is possible. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

PUBLISHED Reserved 2026-04-18 | Published 2026-04-19 | Updated 2026-04-20 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C
5.0AV:N/AC:L/Au:N/C:N/I:P/A:N/E:ND/RL:OF/RC:C

Problem types

Cross Site Scripting

Code Injection

Product status

220323
affected

Timeline

2026-04-18:Advisory disclosed
2026-04-18:VulDB entry created
2026-04-18:VulDB entry last update

Credits

LtzHust2 (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/358196 (VDB-358196 | Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting) vdb-entry technical-description

vuldb.com/vuln/358196/cti (VDB-358196 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/785303 (Submit #785303 | Wavlink WL-WN579A3 V220323 Cross Site Scripting) third-party-advisory

github.com/...g/vul_db/blob/main/WL-WN579A3/vul_16/README.md broken-link

dl.wavlink.com/...-94f93d4-WO-mt7628-squashfs-sysupgrade.bin patch

cve.org (CVE-2026-6559)

nvd.nist.gov (CVE-2026-6559)

Download JSON