Submit #748077: Wavlink WN579A3 20210219 Command Injectioninfo

TitleWavlink WN579A3 20210219 Command Injection
DescriptionA vulnerability has been found in Wavlink WL-WN579A3 20210219. This vulnerability can be triggered through the route /cgi-bin/wireless.cgi. The manipulation of the argument macAddr leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Source⚠️ https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md
User
 Anonymous User
Submission01/28/2026 09:13 (3 months ago)
Moderation02/15/2026 10:01 (18 days later)
StatusAccepted
VulDB entry346118 [Wavlink WL-WN579A3 up to 20210219 /cgi-bin/wireless.cgi AddMac macAddr command injection]
Points19

Want to stay up to date on a daily basis?

Enable the mail alert feature now!