Enviar #748073: Wavlink WN579A3 20210219 Command Injectioninformación

TítuloWavlink WN579A3 20210219 Command Injection
DescripciónA vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument SSID2G2 leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Fuente⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/multi_ssid.md
Usuario
 Anonymous User
Sumisión2026-01-28 09:09 (hace 3 meses)
Moderación2026-02-15 10:01 (18 days later)
EstadoAceptado
Entrada de VulDB346114 [Wavlink WL-WN579A3 hasta 20210219 /cgi-bin/wireless.cgi multi_ssid SSID2G2 escalada de privilegios]
Puntos19

Do you know our Splunk app?

Download it now for free!