Impact
An attacker can manipulate HTTP POST parameters dmz_flag or del_flag in the /cgi-bin/firewall.cgi endpoint of the Wavlink WL‑WN578W2 firmware version 221110. This flaw allows arbitrary system command execution on the device, resulting in complete takeover of the router’s operating system.
Affected Systems
Wavlink WL‑WN578W2 routers running firmware build 221110 are affected. No other Wavlink models or firmware releases are mentioned in the advisory.
Risk and Exploitability
With a CVSS score of 5.3 the vulnerability is rated moderate, yet remote execution of arbitrary code makes it valuable to attackers. The EPSS score is unavailable and the flaw is not listed in the CISA KEV catalog, suggesting no widespread exploitation yet. However, the public nature of the exploit code and the lack of a vendor patch mean that any device exposed to the internet remains at significant risk.
OpenCVE Enrichment