CVE-2026-4164 PUBLISHED

Wavlink WL-WN578W2 POST Request wireless.cgi GuestWifi command injection

Assigner: VulDB
Reserved: 14.03.2026 Published: 15.03.2026 Updated: 15.03.2026

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CVSS Score: 9.3

Product Status

Vendor Wavlink
Product WL-WN578W2
Versions
  • Version 221110 is affected

Credits

  • LtzHust (VulDB User) reporter

References

Problem Types

  • Command Injection CWE
  • Injection CWE