Impact
A flaw in the Delete_Mac_list function of Wavlink WL‑WN579A3’s wireless.cgi allows an attacker to inject and execute arbitrary system commands through manipulation of the delete_list parameter; the vulnerability is exploitable remotely, potentially compromising the device’s integrity and confidentiality.
Affected Systems
The vulnerability impacts Wavlink WL‑WN579A3 routers running firmware versions up to 20210219; any unit still using those firmware releases or earlier is vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% points to a low likelihood of exploitation at present. The issue is not listed in the CISA KEV catalog. Based on the presence of a web‑accessible CGI, the likely attack vector is the router’s web interface—this inference is drawn from the fact that the vulnerability is triggered via an HTTP request to /cgi-bin/wireless.cgi and requires the delete_list argument, implying that remote users who can reach the management interface could exploit it.
OpenCVE Enrichment