Vulnerabilites related to Wavlink - WL-WN578W2
CVE-2025-10324 (GCVE-0-2025-10324)
Vulnerability from cvelistv5
Published
2025-09-12 19:32
Modified
2025-09-12 19:44
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323750 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323750 | signature, permissions-required | |
https://vuldb.com/?submit.643435 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/firewall.cgi/websSysFirewall | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10324", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T19:44:42.520504Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-12T19:44:54.702Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In Wavlink WL-WN578W2 221110 wurde eine Schwachstelle gefunden. Dies betrifft die Funktion sub_401C5C der Datei firewall.cgi. Dank der Manipulation des Arguments pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Command Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-12T19:32:05.157Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323750 | Wavlink WL-WN578W2 firewall.cgi sub_401C5C command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323750" }, { "name": "VDB-323750 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323750" }, { "name": "Submit #643435 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643435" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/firewall.cgi/websSysFirewall" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T10:27:52.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 firewall.cgi sub_401C5C command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10324", "datePublished": "2025-09-12T19:32:05.157Z", "dateReserved": "2025-09-12T08:22:37.837Z", "dateUpdated": "2025-09-12T19:44:54.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10358 (GCVE-0-2025-10358)
Vulnerability from cvelistv5
Published
2025-09-13 08:02
Modified
2025-09-15 15:47
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323772 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323772 | signature, permissions-required | |
https://vuldb.com/?submit.643438 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac | related | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac#proof-of-concept-poc | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10358", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-15T15:47:51.054705Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-15T15:47:54.244Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac#proof-of-concept-poc" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Eine Schwachstelle wurde in Wavlink WL-WN578W2 221110 gefunden. Hiervon betroffen ist die Funktion sub_404850 der Datei /cgi-bin/wireless.cgi. Durch Manipulieren des Arguments delete_list mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz m\u00f6glich. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "OS Command Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-77", "description": "Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-13T08:02:06.212Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323772 | Wavlink WL-WN578W2 wireless.cgi sub_404850 os command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323772" }, { "name": "VDB-323772 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323772" }, { "name": "Submit #643438 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643438" }, { "tags": [ "related" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/DeleteMac#proof-of-concept-poc" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T14:47:36.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 wireless.cgi sub_404850 os command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10358", "datePublished": "2025-09-13T08:02:06.212Z", "dateReserved": "2025-09-12T12:42:28.808Z", "dateUpdated": "2025-09-15T15:47:54.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10323 (GCVE-0-2025-10323)
Vulnerability from cvelistv5
Published
2025-09-12 19:02
Modified
2025-09-12 19:20
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323749 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323749 | signature, permissions-required | |
https://vuldb.com/?submit.643434 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10323", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T19:19:36.633824Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-12T19:20:20.664Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Wavlink WL-WN578W2 221110 entdeckt. Das betrifft die Funktion sub_409184 der Datei /wizard_rep.shtml. Die Bearbeitung des Arguments sel_EncrypTyp verursacht command injection. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Die Ausnutzung wurde ver\u00f6ffentlicht und kann verwendet werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Command Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-12T19:02:05.495Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323749 | Wavlink WL-WN578W2 wizard_rep.shtml sub_409184 command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323749" }, { "name": "VDB-323749 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323749" }, { "name": "Submit #643434 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643434" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T10:27:51.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 wizard_rep.shtml sub_409184 command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10323", "datePublished": "2025-09-12T19:02:05.495Z", "dateReserved": "2025-09-12T08:22:35.308Z", "dateUpdated": "2025-09-12T19:20:20.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10322 (GCVE-0-2025-10322)
Vulnerability from cvelistv5
Published
2025-09-12 18:02
Modified
2025-09-12 18:15
Severity ?
5.5 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R
VLAI Severity ?
EPSS score ?
CWE
- CWE-640 - Weak Password Recovery
Summary
A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323748 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323748 | signature, permissions-required | |
https://vuldb.com/?submit.643433 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/sysinit.html | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10322", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T18:15:00.957395Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-12T18:15:23.736Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Eine Schwachstelle wurde in Wavlink WL-WN578W2 221110 gefunden. Es betrifft eine unbekannte Funktion der Datei /sysinit.html. Die Ver\u00e4nderung des Parameters newpass/confpass resultiert in weak password recovery. Der Angriff kann remote ausgef\u00fchrt werden. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-640", "description": "Weak Password Recovery", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-12T18:02:05.947Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323748 | Wavlink WL-WN578W2 sysinit.html password recovery", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323748" }, { "name": "VDB-323748 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323748" }, { "name": "Submit #643433 | Wavlink WL-WN578W2 M78W2_V221110 Unverified Password Change", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643433" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/sysinit.html" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T10:27:49.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 sysinit.html password recovery" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10322", "datePublished": "2025-09-12T18:02:05.947Z", "dateReserved": "2025-09-12T08:22:32.239Z", "dateUpdated": "2025-09-12T18:15:23.736Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10359 (GCVE-0-2025-10359)
Vulnerability from cvelistv5
Published
2025-09-13 13:02
Modified
2025-09-15 15:36
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323773 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323773 | signature, permissions-required | |
https://vuldb.com/?submit.643444 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac/ | related | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac#proof-of-concept-poc | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10359", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-15T15:35:48.702173Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-15T15:36:15.362Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "Es wurde eine Schwachstelle in Wavlink WL-WN578W2 221110 entdeckt. Betroffen ist die Funktion sub_404DBC der Datei /cgi-bin/wireless.cgi. Durch das Beeinflussen des Arguments macAddr mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Es ist m\u00f6glich, den Angriff aus der Ferne durchzuf\u00fchren. Der Exploit ist \u00f6ffentlich verf\u00fcgbar und k\u00f6nnte genutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "OS Command Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-77", "description": "Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-13T13:02:05.356Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323773 | Wavlink WL-WN578W2 wireless.cgi sub_404DBC os command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323773" }, { "name": "VDB-323773 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323773" }, { "name": "Submit #643444 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643444" }, { "tags": [ "related" ], "url": "https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac/" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/wireless.cgi/add_mac#proof-of-concept-poc" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T14:47:37.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 wireless.cgi sub_404DBC os command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10359", "datePublished": "2025-09-13T13:02:05.356Z", "dateReserved": "2025-09-12T12:42:31.682Z", "dateUpdated": "2025-09-15T15:36:15.362Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10321 (GCVE-0-2025-10321)
Vulnerability from cvelistv5
Published
2025-09-12 17:32
Modified
2025-09-12 18:14
Severity ?
5.5 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R
VLAI Severity ?
EPSS score ?
Summary
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323747 | vdb-entry | |
https://vuldb.com/?ctiid.323747 | signature, permissions-required | |
https://vuldb.com/?submit.643431 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/live_online.shtml | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10321", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T18:14:43.636375Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-12T18:14:55.276Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In Wavlink WL-WN578W2 221110 ist eine Schwachstelle entdeckt worden. Betroffen davon ist eine unbekannte Funktion der Datei /live_online.shtml. Die Manipulation f\u00fchrt zu information disclosure. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Die Schwachstelle wurde \u00f6ffentlich offengelegt und k\u00f6nnte ausgenutzt werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "Information Disclosure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-12T17:32:05.863Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323747 | Wavlink WL-WN578W2 live_online.shtml information disclosure", "tags": [ "vdb-entry" ], "url": "https://vuldb.com/?id.323747" }, { "name": "VDB-323747 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323747" }, { "name": "Submit #643431 | Wavlink WL-WN578W2 M78W2_V221110 Exposure of Sensitive Information Due to Incompatible Policies", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643431" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/live_online.shtml" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T10:27:47.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 live_online.shtml information disclosure" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10321", "datePublished": "2025-09-12T17:32:05.863Z", "dateReserved": "2025-09-12T08:22:29.035Z", "dateUpdated": "2025-09-12T18:14:55.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-10325 (GCVE-0-2025-10325)
Vulnerability from cvelistv5
Published
2025-09-12 20:02
Modified
2025-09-12 20:25
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
▼ | URL | Tags |
---|---|---|
https://vuldb.com/?id.323751 | vdb-entry, technical-description | |
https://vuldb.com/?ctiid.323751 | signature, permissions-required | |
https://vuldb.com/?submit.643436 | third-party-advisory | |
https://vuldb.com/?submit.643437 | third-party-advisory | |
https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md | exploit |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Wavlink | WL-WN578W2 |
Version: 221110 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-10325", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T20:25:06.290817Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-12T20:25:31.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WL-WN578W2", "vendor": "Wavlink", "versions": [ { "status": "affected", "version": "221110" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "n0ps1ed (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way." }, { "lang": "de", "value": "In Wavlink WL-WN578W2 221110 ist eine Schwachstelle entdeckt worden. Dabei betrifft es die Funktion sub_401340/sub_401BA4 der Datei /cgi-bin/login.cgi. Dank Manipulation des Arguments ipaddr mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit wurde der \u00d6ffentlichkeit bekannt gemacht und k\u00f6nnte verwendet werden." } ], "metrics": [ { "cvssV4_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:W/RC:UR", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "Command Injection", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-74", "description": "Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-12T20:02:05.804Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-323751 | Wavlink WL-WN578W2 login.cgi sub_401BA4 command injection", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.323751" }, { "name": "VDB-323751 | CTI Indicators (IOB, IOC, TTP, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.323751" }, { "name": "Submit #643436 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643436" }, { "name": "Submit #643437 | Wavlink WL-WN578W2 M78W2_V221110 Command Injection (Duplicate)", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.643437" }, { "tags": [ "exploit" ], "url": "https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md" } ], "timeline": [ { "lang": "en", "time": "2025-09-12T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-09-12T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-09-12T14:42:47.000Z", "value": "VulDB entry last update" } ], "title": "Wavlink WL-WN578W2 login.cgi sub_401BA4 command injection" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-10325", "datePublished": "2025-09-12T20:02:05.804Z", "dateReserved": "2025-09-12T08:22:41.117Z", "dateUpdated": "2025-09-12T20:25:31.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }