Wavlink

Wl-wn578w2

3 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 22.03.2026 09:58:12
  • Zuletzt bearbeitet 23.03.2026 14:31:37

A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cros...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 22.03.2026 09:23:28
  • Zuletzt bearbeitet 23.03.2026 14:31:37

A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in comman...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 15.03.2026 03:02:10
  • Zuletzt bearbeitet 16.03.2026 14:53:07

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is poss...