Impact
The flaw occurs in the UpnpEnabled parameter handling within the UPnP handler’s firewall.cgi script. By sending a crafted value the attacker overflows the stack, allowing arbitrary code execution on the device. This can compromise confidentiality, integrity, and availability of the router and potentially any devices behind it.
Affected Systems
The vulnerability affects Wavlink routers running the WL‑WN579X3‑C model with firmware build 231124. No wider product range or version was listed.
Risk and Exploitability
With a CVSS base score of 8.7 the flaw is considered high severity. The EPSS score is below 1 %, indicating a low probability of current exploitation in the wild, and the vulnerability is not yet in CISA’s KEV catalog. Attackers can trigger the overflow remotely by targeting the upnp-enabled argument through the public interface, which implies a remote, unauthenticated attack vector.
OpenCVE Enrichment