A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Mon, 15 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wavlink
Wavlink wl-wn578w2 |
|
Vendors & Products |
Wavlink
Wavlink wl-wn578w2 |
Sat, 13 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Wavlink WL-WN578W2 wireless.cgi sub_404DBC os command injection | |
Weaknesses | CWE-77 CWE-78 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-13T13:02:05.356Z
Updated: 2025-09-13T13:02:05.356Z
Reserved: 2025-09-12T12:42:31.682Z
Link: CVE-2025-10359

No data.

Status : Received
Published: 2025-09-13T13:15:32.190
Modified: 2025-09-13T13:15:32.190
Link: CVE-2025-10359

No data.