Impact
The vulnerability exists in the multi_ssid function of the /cgi-bin/wireless.cgi script on Wavlink WL‑WN579A3 routers. By manipulating the SSID2G2 argument an attacker can inject arbitrary shell commands, resulting in remote command execution. This flaw is a classic instance of command injection (CWE‑74) combined with improper command sanitization (CWE‑77). Successful exploitation would allow an attacker to compromise the confidentiality, integrity, and availability of the device and potentially the network it serves.
Affected Systems
Wavlink WL‑WN579A3 routers with firmware versions up to and including 20210219 are affected. The issue is triggered through the web management interface exposed at /cgi-bin/wireless.cgi and only requires remote HTTP access to the device.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the EPSS is reported as less than 1 %, implying a low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The public exploit provides a ready‑to‑use attack chain, allowing any remote actor to send an HTTP request with a crafted SSID2G2 value to achieve command injection without additional prerequisites.
OpenCVE Enrichment