Submeter #748077: Wavlink WN579A3 20210219 Command Injectioninformação

TítuloWavlink WN579A3 20210219 Command Injection
DescriçãoA vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument macAddr leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Fonte⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md
Utilizador
 Anonymous User
Submissão28/01/2026 09h13 (há 3 meses)
Moderação15/02/2026 10h01 (18 days later)
EstadoAceite
Entrada VulDB346118 [Wavlink WL-WN579A3 até 20210219 /cgi-bin/wireless.cgi AddMac macAddr Elevação de Privilégios]
Pontos19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!