Impact
A flaw has been found in the Delete_Mac_list, SetName, and GuestWifi functions of /cgi-bin/wireless.cgi on the Wavlink WL‑WN578W2. The vulnerability allows an attacker to inject arbitrary shell commands via a crafted POST request. This results in remote command execution with the privileges of the web service process. The weakness corresponds to CWE‑74 (Untrusted Input to a Command Processor) and CWE‑77 (Improper Limitation of a Command).
Affected Systems
The issue affects Wavlink WL‑WN578W2 routers running the 221110 firmware build. Only devices that expose the /cgi-bin/wireless.cgi endpoint with the GuestWifi functionality are vulnerable, as described in the vendor’s documentation.
Risk and Exploitability
The CVSS base score is 9.3, classifying the vulnerability as critical. EPSS is below 1 %, indicating a low current exploitation probability, yet an exploit has been published and is available. The vulnerability is not listed in the CISA KEV catalog. The vendor confirms that the attack can be launched remotely via a POST request to /cgi-bin/wireless.cgi without prior authentication.
OpenCVE Enrichment