Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Wavlink WL-WN578W2 firewall.cgi sub_401C5C command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-12T19:44:54.702Z
Reserved: 2025-09-12T08:22:37.837Z
Link: CVE-2025-10324

Updated: 2025-09-12T19:44:45.693Z

Status : Received
Published: 2025-09-12T20:15:42.280
Modified: 2025-09-12T20:15:42.280
Link: CVE-2025-10324

No data.

No data.