Impact
A command injection flaw exists in the ping_ddns function in /cgi-bin/adm.cgi on the Wavlink WL-WN570HA1 R70HA1 V1410_221110 firmware. An attacker can manipulate the DDNS parameter from a remote IP address to inject arbitrary shell commands, potentially executing code on the device. The vulnerability is classified as CWE‑74 and CWE‑77 and is exploitable without local access.
Affected Systems
The affected product is the Wavlink WL‑WN570HA1 router. Only the firmware build R70HA1 V1410_221110 is known to contain the flaw. The device is no longer supported and has been removed from the vendor’s download page, so no official patch is available.
Risk and Exploitability
With a CVSS score of 5.3 the flaw is considered moderate severity. The EPSS score of 1% indicates a low but non‑zero probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. The attack can be triggered remotely from the Internet, meaning any exposed router could be compromised if remote administration is enabled. Because no vendor fix exists, the risk persists until the device is replaced or physically isolated.
OpenCVE Enrichment