Description
A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown function of the file /cgi-bin/login.cgi. Executing a manipulation of the argument key can lead to command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A command‑injection flaw exists in the /cgi-bin/login.cgi function of the Wavlink WL‑WN579A3 router. By manipulating the "key" argument in the CGI request, an attacker can execute arbitrary shell commands on the device. The vulnerability is an instance of CWE‑74 (Command Injection) and CWE‑77 (Command Injection). If exploited, the attacker would gain remote, privileged control over the router, potentially compromising network traffic and device configuration.

Affected Systems

The flaw affects the Wavlink WL‑WN579A3 router, specifically firmware versions up to and including 20210219. The product is distributed as a consumer‑grade router and may be present in home or small business networks where the device is exposed to the internet.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity. The EPSS score is less than 1%, suggesting low but non‑zero probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires remote network connectivity to the device and the ability to send a crafted HTTP request to the login CGI endpoint. No defense‑in‑depth controls are mentioned, so the attack path is straightforward once the target is reachable. The vendor has not released a patch, and the only publicly disclosed exploit is via an online repository.

Generated by OpenCVE AI on April 17, 2026 at 19:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and flash the latest firmware revision from the Wavlink official website when it becomes available.
  • Limit external access to the device by configuring the network firewall to allow connections to the router only from trusted internal networks or a VPN tunnel.
  • Regularly review the router’s system logs for unexpected POST requests to /cgi-bin/login.cgi and investigate any anomalies.

Generated by OpenCVE AI on April 17, 2026 at 19:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-wn579a3 Firmware
CPEs cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-wn579a3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink wl-wn579a3 Firmware

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink
Wavlink wl-wn579a3
Vendors & Products Wavlink
Wavlink wl-wn579a3

Mon, 16 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Wavlink WL-WN579A3 up to 20210219. Affected is an unknown function of the file /cgi-bin/login.cgi. Executing a manipulation of the argument key can lead to command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Wavlink WL-WN579A3 login.cgi command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-wn579a3 Wl-wn579a3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:03:49.614Z

Reserved: 2026-02-15T09:01:28.535Z

Link: CVE-2026-2527

cve-icon Vulnrichment

Updated: 2026-02-17T17:14:43.140Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T02:16:06.620

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:30:15Z

Weaknesses