| عنوان | Wavlink WN579A3 20210219 Command Injection |
|---|
| الوصف | A vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument macAddr leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
|---|
| المصدر | ⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md |
|---|
| المستخدم | Anonymous User |
|---|
| ارسال | 28/01/2026 09:13 AM (3 أشهر منذ) |
|---|
| الاعتدال | 15/02/2026 10:01 AM (18 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 346118 [Wavlink WL-WN579A3 حتى 20210219 /cgi-bin/wireless.cgi AddMac macAddr تجاوز الصلاحيات] |
|---|
| النقاط | 19 |
|---|