Description
A vulnerability was detected in Wavlink WL-WN570HA1 R70HA1 V1410_221110. The affected element is the function ping_ddns of the file /cgi-bin/adm.cgi. Performing a manipulation of the argument DDNS results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. Once again the vendors acted very professional and confirms, "that the WN570HA1 firmware version R70HA1 V1410_221110 has been removed from our website." This vulnerability only affects products that are no longer supported by the maintainer.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A command injection flaw exists in the ping_ddns function in /cgi-bin/adm.cgi on the Wavlink WL-WN570HA1 R70HA1 V1410_221110 firmware. An attacker can manipulate the DDNS parameter from a remote IP address to inject arbitrary shell commands, potentially executing code on the device. The vulnerability is classified as CWE‑74 and CWE‑77 and is exploitable without local access.

Affected Systems

The affected product is the Wavlink WL‑WN570HA1 router. Only the firmware build R70HA1 V1410_221110 is known to contain the flaw. The device is no longer supported and has been removed from the vendor’s download page, so no official patch is available.

Risk and Exploitability

With a CVSS score of 5.3 the flaw is considered moderate severity. The EPSS score of 1% indicates a low but non‑zero probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. The attack can be triggered remotely from the Internet, meaning any exposed router could be compromised if remote administration is enabled. Because no vendor fix exists, the risk persists until the device is replaced or physically isolated.

Generated by OpenCVE AI on May 3, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable remote administration and web‑interface access on the router’s management console.
  • Configure network firewalls or upstream routers to block inbound access to the /cgi-bin/adm.cgi path from untrusted sources.
  • Replace the Wavlink WL‑WN570HA1 with a supported model that has received current firmware updates.
  • If replacement is not immediately possible, monitor router logs for suspicious command execution attempts and enforce strict IP filtering on management interfaces.

Generated by OpenCVE AI on May 3, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink
Wavlink wl-wn570ha1
Vendors & Products Wavlink
Wavlink wl-wn570ha1

Sun, 03 May 2026 11:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in Wavlink WL-WN570HA1 R70HA1 V1410_221110. The affected element is the function ping_ddns of the file /cgi-bin/adm.cgi. Performing a manipulation of the argument DDNS results in command injection. The attack can be initiated remotely. The exploit is now public and may be used. Once again the vendors acted very professional and confirms, "that the WN570HA1 firmware version R70HA1 V1410_221110 has been removed from our website." This vulnerability only affects products that are no longer supported by the maintainer.
Title Wavlink WL-WN570HA1 adm.cgi ping_ddns command injection
Weaknesses CWE-74
CWE-77
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-wn570ha1
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T11:00:12.931Z

Reserved: 2026-05-02T16:33:38.615Z

Link: CVE-2026-7692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T11:16:13.927

Modified: 2026-05-03T11:16:13.927

Link: CVE-2026-7692

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T21:32:36Z

Weaknesses