Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Wavlink WL-WN578W2 wizard_rep.shtml sub_409184 command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-12T19:20:20.664Z
Reserved: 2025-09-12T08:22:35.308Z
Link: CVE-2025-10323

Updated: 2025-09-12T19:19:46.425Z

Status : Received
Published: 2025-09-12T19:15:32.147
Modified: 2025-09-12T19:15:32.147
Link: CVE-2025-10323

No data.

No data.