A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is the function sub_409184 of the file /wizard_rep.shtml. The manipulation of the argument sel_EncrypTyp results in command injection. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.323749 | Permissions Required VDB Entry |
https://vuldb.com/?id.323749 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.643434 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Oct 2025, 19:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/adm.cgi/wizard_rep.shtml - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.323749 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.323749 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.643434 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:h:wavlink:wl-wn578w2:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-wn578w2_firmware:m78w2_v221110:*:*:*:*:*:*:* |
|
First Time |
Wavlink wl-wn578w2
Wavlink Wavlink wl-wn578w2 Firmware |
12 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-12 19:15
Updated : 2025-10-02 19:47
NVD link : CVE-2025-10323
Mitre link : CVE-2025-10323
CVE.ORG link : CVE-2025-10323
JSON object : View
Products Affected
wavlink
- wl-wn578w2_firmware
- wl-wn578w2