Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Wavlink WL-WN578W2 login.cgi sub_401BA4 command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-09-12T20:25:31.094Z
Reserved: 2025-09-12T08:22:41.117Z
Link: CVE-2025-10325

Updated: 2025-09-12T20:25:09.699Z

Status : Received
Published: 2025-09-12T20:15:42.493
Modified: 2025-09-12T20:15:42.493
Link: CVE-2025-10325

No data.

No data.