Impact
The vulnerability allows an attacker to inject arbitrary system commands through the Username parameter of the set_sys_adm function in the adm.cgi file, leading to remote code execution on the device. This cmd‑injection weakness (CWE‑74) and its potential misuse of system privileges (CWE‑77) enable an attacker to run any commands with the privileges of the gateway process, compromising device integrity and confidentiality.
Affected Systems
The affected product is the Wavlink WL‑WN570HA1 router running firmware R70HA1 V1410_221110, which is no longer supported and has been removed from the vendor’s website. No newer firmware versions are currently available for this hardware model.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the vulnerability is exploitable remotely. Although there is no EPSS value or KEV listing, the publicly available exploit code increases the likelihood of real‑world attacks against devices that remain online. Because the device is unsupported, the risk is higher as no vendor patches are forthcoming.
OpenCVE Enrichment