Impact
The vulnerability exists in the SetName/GuestWifi function within /cgi-bin/wireless.cgi of the Wavlink WL-WN579A3 firmware. An attacker can craft specially formed POST requests that are not properly sanitized, resulting in OS command injection (CWE-74 and CWE-77). Successful exploitation allows execution of arbitrary shell commands on the device, leading to full compromise of confidentiality, integrity, and availability of the wireless router and any networks it supports.
Affected Systems
Affected product: Wavlink WL-WN579A3 firmware version 220323 (or any firmware incorporating the original SetName/GuestWifi implementation). Users of this model are directly impacted by the command injection flaw exposed through the POST Request Handler in wireless.cgi.
Risk and Exploitability
The flaw carries a CVSS score of 9.3, indicating critical severity, and an EPSS score of less than 1%, suggesting that while exploitation is technically possible, it may not be widespread yet. The vulnerability is not listed in CISA’s KEV catalog, but the public exploit code available in GitHub repositories indicates active interest. Attackers can remotely trigger the flaw by sending a crafted POST request over the network, bypassing authentication or other controls that may exist. Remediation through firmware upgrade eliminates the attack surface.
OpenCVE Enrichment