A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.323751 | Permissions Required VDB Entry |
https://vuldb.com/?id.323751 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.643436 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.643437 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Oct 2025, 20:17
Type | Values Removed | Values Added |
---|---|---|
First Time |
Wavlink wl-wn578w2 Firmware
Wavlink wl-wn578w2 Wavlink |
|
References | () https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?ctiid.323751 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.323751 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.643436 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.643437 - Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:h:wavlink:wl-wn578w2:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-wn578w2_firmware:m78w2_v221110:*:*:*:*:*:*:* |
12 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-12 20:15
Updated : 2025-10-02 20:17
NVD link : CVE-2025-10325
Mitre link : CVE-2025-10325
CVE.ORG link : CVE-2025-10325
JSON object : View
Products Affected
wavlink
- wl-wn578w2
- wl-wn578w2_firmware