Impact
The vulnerability lies in the sub_401F80 function of /cgi-bin/login.cgi in Wavlink WL-WN579A3 firmware 220323. An attacker can manipulate the Hostname argument, causing the script to be executed in the victim’s browser. This enables malicious code execution within the context of the web interface, potentially leading to data theft or session hijacking. The weakness is an unchecked input that is reflected in the response, classifying it under CWE‑79 and the associated code evaluation abuse listed as CWE‑94.
Affected Systems
The issue affects the Wavlink WL‑WN579A3 router running firmware version 220323. All devices that have not applied the vendor’s patch are exposed.
Risk and Exploitability
The CVSS score of 5.3 points to moderate impact; EPSS is unavailable, and the vulnerability is not listed in the CISA KEV catalog. Because the flaw is exploitable remotely via the HTTP interface, an attacker only needs to send a crafted request to the login.cgi endpoint. The exploit does not require elevated privileges on the device, making it broadly available to anyone able to reach the router’s web interface.
OpenCVE Enrichment