| Título | Wavlink WN579A3 20210219 Command Injection |
|---|
| Descripción | A vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/login.cgi. The manipulation of the argument key leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
|---|
| Fuente | ⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/login.md |
|---|
| Usuario | Anonymous User |
|---|
| Sumisión | 2026-01-28 09:10 (hace 3 meses) |
|---|
| Moderación | 2026-02-15 10:01 (18 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 346115 [Wavlink WL-WN579A3 hasta 20210219 /cgi-bin/login.cgi key escalada de privilegios] |
|---|
| Puntos | 19 |
|---|