Description
A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability is the function Delete_Mac_list of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command injection
Action: Patch
AI Analysis

Impact

A flaw in the Delete_Mac_list function of Wavlink WL‑WN579A3’s wireless.cgi allows an attacker to inject and execute arbitrary system commands through manipulation of the delete_list parameter; the vulnerability is exploitable remotely, potentially compromising the device’s integrity and confidentiality.

Affected Systems

The vulnerability impacts Wavlink WL‑WN579A3 routers running firmware versions up to 20210219; any unit still using those firmware releases or earlier is vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% points to a low likelihood of exploitation at present. The issue is not listed in the CISA KEV catalog. Based on the presence of a web‑accessible CGI, the likely attack vector is the router’s web interface—this inference is drawn from the fact that the vulnerability is triggered via an HTTP request to /cgi-bin/wireless.cgi and requires the delete_list argument, implying that remote users who can reach the management interface could exploit it.

Generated by OpenCVE AI on April 18, 2026 at 12:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Wavlink that patches the Delete_Mac_list command injection flaw
  • If an immediate firmware update cannot be applied, restrict access to the router’s web interface by configuring the firewall or router to block inbound connections on the management ports to external networks
  • Change default administrative credentials and disable remote management features if they are not needed

Generated by OpenCVE AI on April 18, 2026 at 12:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-wn579a3 Firmware
CPEs cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-wn579a3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink wl-wn579a3 Firmware

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink
Wavlink wl-wn579a3
Vendors & Products Wavlink
Wavlink wl-wn579a3

Mon, 16 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability is the function Delete_Mac_list of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-wn579a3 Wl-wn579a3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:04:01.174Z

Reserved: 2026-02-15T09:01:32.163Z

Link: CVE-2026-2528

cve-icon Vulnrichment

Updated: 2026-02-17T17:06:25.539Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T02:16:06.807

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2528

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses