Impact
The vulnerability resides in the POST request handler of /cgi-bin/login.cgi on Wavlink WL‑WN578W2 routers running firmware 221110. By altering the "homepage/hostname/login_page" parameter, an attacker can inject arbitrary JavaScript code, creating a client‑side cross‑site scripting flaw.
Affected Systems
Affected devices are Wavlink WL‑WN578W2 routers with firmware version 221110. No other variants are known to be impacted.
Risk and Exploitability
The CVSS score of 4.8 indicates moderate severity. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. The description states that the attack can be launched remotely, implying that an adversary needs only network access to the router’s web interface to exploit the flaw. Currently no official patch has been released and the vendor has not responded to the disclosure.
OpenCVE Enrichment