Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rg5p-437p-3vjq

Опубликовано: 12 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 62%
0.00431
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74
CWE-77

Связанные уязвимости

CVSS3: 6.3
nvd
5 месяцев назад

A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
fstec
5 месяцев назад

Уязвимость функции sub_401340() (/cgi-bin/login.cgi) микропрограммного обеспечения усилителей сигнала WAVLINK WL-WN578W2, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 62%
0.00431
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74
CWE-77