제출 #748073: Wavlink WN579A3 20210219 Command Injection정보

제목Wavlink WN579A3 20210219 Command Injection
설명A vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument SSID2G2 leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
원천⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/multi_ssid.md
사용자
 Anonymous User
제출2026. 01. 28. AM 09:09 (3 개월 ago)
모더레이션2026. 02. 15. AM 10:01 (18 days later)
상태수락
VulDB 항목346114 [Wavlink WL-WN579A3 까지 20210219 /cgi-bin/wireless.cgi multi_ssid SSID2G2 권한 상승]
포인트들19

Want to know what is going to be exploited?

We predict KEV entries!