CVE-2026-4163 PUBLISHED

Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi command injection

Assigner: VulDB
Reserved: 14.03.2026 Published: 14.03.2026 Updated: 14.03.2026

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 9.3

Product Status

Vendor Wavlink
Product WL-WN579A3
Versions
  • Version 220323 is affected

Credits

  • LtzHuster (VulDB User) reporter

References

Problem Types

  • Command Injection CWE
  • Injection CWE