Impact
A command injection flaw exists in the set_sys_cmd function of the /cgi-bin/adm.cgi file on the Wavlink WL‑WN570HA1 router. The vulnerability allows an attacker to supply crafted arguments that are interpreted by the underlying operating system, enabling execution of arbitrary shell commands. This can compromise the confidentiality, integrity, and availability of the affected device and any network resources it connects to. The weakness is a combination of CWE‑74 (Improper Neutralization of Special Elements in Input) and CWE‑77 (Command Injection).
Affected Systems
The flaw affects the Wavlink WL‑WN570HA1 router with firmware version R70HA1 V1410_221110. This specific revision is no longer supported or available from the vendor and therefore no patch is presently provided.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. The attack can be performed remotely, most likely by sending HTTP requests to the router’s administrative web interface. Because the device is out of support, attackers could exploit the flaw until the device is either replaced or isolated.
OpenCVE Enrichment