Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgmv-83cp-gpc7

Опубликовано: 16 мар. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 8.9
CVSS3: 9.8

Описание

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

EPSS

Процентиль: 46%
0.00227
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 9.8
nvd
26 дней назад

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

EPSS

Процентиль: 46%
0.00227
Низкий

8.9 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-74