CVE-2026-4543 PUBLISHED

Wavlink WL-WN578W2 POST Request firewall.cgi command injection

Assigner: VulDB
Reserved: 21.03.2026 Published: 22.03.2026 Updated: 22.03.2026

A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 5.3

Product Status

Vendor Wavlink
Product WL-WN578W2
Versions
  • Version 221110 is affected

Credits

  • LtzHuster (VulDB User) reporter
  • VulDB coordinator

References

Problem Types

  • Command Injection CWE
  • Injection CWE