CVE-2025-10321: Information Disclosure in Wavlink WL-WN578W2
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10321 is a medium-severity information disclosure vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The flaw resides in an unspecified function within the /live_online.shtml file, which is part of the device's web interface. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction, by sending crafted requests to the affected endpoint. Successful exploitation results in unauthorized disclosure of sensitive information, which could include configuration details, network information, or other data exposed by the vulnerable web page. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a moderate risk primarily due to its remote exploitability and lack of required privileges, but limited impact on integrity or availability. The vendor, Wavlink, was notified early but has not issued a response or patch, and while a public exploit exists, there are no confirmed reports of active exploitation in the wild at this time. This lack of vendor response increases the risk for users of this device, as no official remediation is currently available.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router, this vulnerability poses a risk of sensitive information leakage that could aid attackers in further compromising network security. Information disclosed might include network configurations, device status, or credentials, which could facilitate lateral movement, targeted attacks, or unauthorized access to internal resources. Small and medium enterprises (SMEs) and home office setups relying on this device without additional security layers are particularly vulnerable. The impact is heightened in environments where network segmentation or monitoring is limited. Although the vulnerability does not directly allow code execution or denial of service, the information disclosure can be a stepping stone for more severe attacks. Given the lack of vendor patching, European organizations must consider the risk of prolonged exposure, especially in sectors with sensitive data such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include isolating the affected device from untrusted networks, restricting remote management access via firewall rules or VPNs, and disabling remote web administration if possible. Network monitoring should be enhanced to detect unusual HTTP requests targeting /live_online.shtml or other suspicious activity. Organizations should consider replacing the Wavlink WL-WN578W2 router with a more secure and actively supported device. If replacement is not feasible, deploying network segmentation to limit the router's exposure and using intrusion detection/prevention systems to block exploit attempts is recommended. Regularly reviewing device firmware updates from Wavlink is essential in case a patch is released. Additionally, educating users about the risks and encouraging strong network security hygiene will help mitigate potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10321: Information Disclosure in Wavlink WL-WN578W2
Description
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10321 is a medium-severity information disclosure vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The flaw resides in an unspecified function within the /live_online.shtml file, which is part of the device's web interface. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction, by sending crafted requests to the affected endpoint. Successful exploitation results in unauthorized disclosure of sensitive information, which could include configuration details, network information, or other data exposed by the vulnerable web page. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a moderate risk primarily due to its remote exploitability and lack of required privileges, but limited impact on integrity or availability. The vendor, Wavlink, was notified early but has not issued a response or patch, and while a public exploit exists, there are no confirmed reports of active exploitation in the wild at this time. This lack of vendor response increases the risk for users of this device, as no official remediation is currently available.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router, this vulnerability poses a risk of sensitive information leakage that could aid attackers in further compromising network security. Information disclosed might include network configurations, device status, or credentials, which could facilitate lateral movement, targeted attacks, or unauthorized access to internal resources. Small and medium enterprises (SMEs) and home office setups relying on this device without additional security layers are particularly vulnerable. The impact is heightened in environments where network segmentation or monitoring is limited. Although the vulnerability does not directly allow code execution or denial of service, the information disclosure can be a stepping stone for more severe attacks. Given the lack of vendor patching, European organizations must consider the risk of prolonged exposure, especially in sectors with sensitive data such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include isolating the affected device from untrusted networks, restricting remote management access via firewall rules or VPNs, and disabling remote web administration if possible. Network monitoring should be enhanced to detect unusual HTTP requests targeting /live_online.shtml or other suspicious activity. Organizations should consider replacing the Wavlink WL-WN578W2 router with a more secure and actively supported device. If replacement is not feasible, deploying network segmentation to limit the router's exposure and using intrusion detection/prevention systems to block exploit attempts is recommended. Regularly reviewing device firmware updates from Wavlink is essential in case a patch is released. Additionally, educating users about the risks and encouraging strong network security hygiene will help mitigate potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T08:22:29.035Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c4a9e26da8ad0abf36f2af
Added to database: 9/12/2025, 11:16:50 PM
Last enriched: 9/12/2025, 11:18:39 PM
Last updated: 9/12/2025, 11:18:39 PM
Views: 2
Related Threats
CVE-2025-10298
LowCVE-2025-4974
LowCVE-2025-10319: Improper Authorization in JeecgBoot
MediumCVE-2025-55996: n/a
MediumCVE-2025-25293: CWE-400: Uncontrolled Resource Consumption in SAML-Toolkits ruby-saml
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.