| Название | Wavlink WN579A3 20210219 Command Injection |
|---|
| Описание | A vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument SSID2G2 leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
|---|
| Источник | ⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/multi_ssid.md |
|---|
| Пользователь | Anonymous User |
|---|
| Представление | 28.01.2026 09:09 (3 месяцы назад) |
|---|
| Модерация | 15.02.2026 10:01 (18 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 346114 [Wavlink WL-WN579A3 до 20210219 /cgi-bin/wireless.cgi multi_ssid SSID2G2 эскалация привилегий] |
|---|
| Баллы | 19 |
|---|