Description
A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddMac of the file /cgi-bin/wireless.cgi. This manipulation of the argument macAddr causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the AddMac command of /cgi-bin/wireless.cgi on the Wavlink WL-WN579A3 router. By manipulating the macAddr argument, an attacker can inject arbitrary shell commands, leading to remote execution of code on the device. Because the flaw is reachable from the network side, remote attackers with network access to the router’s web interface can exploit it without requiring local credentials.

Affected Systems

The affected product is the Wavlink WL-WN579A3 wireless router. All firmware releases up to the 20210219 build are vulnerable. No other vendors or versions are impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and it is not listed in the CISA KEV catalog. Nevertheless, the flaw enables remote code execution and the exploit code is publicly available. The vendor did not respond to disclosure, so no official patch exists at present.

Generated by OpenCVE AI on April 17, 2026 at 19:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available firmware update from Wavlink that removes the vulnerable AddMac functionality or validates input against command injection.
  • If no update is available, block or restrict access to /cgi-bin/wireless.cgi from untrusted networks and enforce stricter authentication or disable remote management.
  • Monitor device logs for attempts to invoke AddMac with malformed macAddr values and alert on suspicious activity.

Generated by OpenCVE AI on April 17, 2026 at 19:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-wn579a3 Firmware
CPEs cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-wn579a3_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink wl-wn579a3 Firmware

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink
Wavlink wl-wn579a3
Vendors & Products Wavlink
Wavlink wl-wn579a3

Mon, 16 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddMac of the file /cgi-bin/wireless.cgi. This manipulation of the argument macAddr causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Wavlink WL-WN579A3 wireless.cgi AddMac command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-wn579a3 Wl-wn579a3 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:04:27.221Z

Reserved: 2026-02-15T09:01:37.444Z

Link: CVE-2026-2530

cve-icon Vulnrichment

Updated: 2026-02-17T17:13:09.781Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T04:15:51.677

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2530

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:30:15Z

Weaknesses