Soumettre #748077: Wavlink WN579A3 20210219 Command Injectioninformation

TitreWavlink WN579A3 20210219 Command Injection
DescriptionA vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument macAddr leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
La source⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md
Utilisateur
 Anonymous User
Soumission28/01/2026 09:13 (il y a 3 mois)
Modérer15/02/2026 10:01 (18 days later)
StatutAccepté
Entrée VulDB346118 [Wavlink WL-WN579A3 jusqu’à 20210219 /cgi-bin/wireless.cgi AddMac macAddr élévation de privilèges]
Points19

Do you want to use VulDB in your project?

Use the official API to access entries easily!