Metrics
Affected Vendors & Products
Mon, 15 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wavlink
Wavlink wl-wn578w2 |
|
Vendors & Products |
Wavlink
Wavlink wl-wn578w2 |
Fri, 12 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
Title | Wavlink WL-WN578W2 firewall.cgi sub_401C5C command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-09-12T19:32:05.157Z
Updated: 2025-09-12T19:44:54.702Z
Reserved: 2025-09-12T08:22:37.837Z
Link: CVE-2025-10324

Updated: 2025-09-12T19:44:45.693Z

Status : Awaiting Analysis
Published: 2025-09-12T20:15:42.280
Modified: 2025-09-15T15:21:42.937
Link: CVE-2025-10324

No data.