CVE-2025-10321: Information Disclosure in Wavlink WL-WN578W2
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10321 is a medium-severity information disclosure vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The flaw resides in an unspecified function within the /live_online.shtml file, which is part of the device's web interface. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction, by sending crafted requests to the affected endpoint. Successful exploitation results in unauthorized disclosure of sensitive information, which could include configuration details, network information, or other data exposed by the vulnerable web page. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a moderate risk primarily due to its remote exploitability and lack of required privileges, but limited impact on integrity or availability. The vendor, Wavlink, was notified early but has not issued a response or patch, and while a public exploit exists, there are no confirmed reports of active exploitation in the wild at this time. This lack of vendor response increases the risk for users of this device, as no official remediation is currently available.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router, this vulnerability poses a risk of sensitive information leakage that could aid attackers in further compromising network security. Information disclosed might include network configurations, device status, or credentials, which could facilitate lateral movement, targeted attacks, or unauthorized access to internal resources. Small and medium enterprises (SMEs) and home office setups relying on this device without additional security layers are particularly vulnerable. The impact is heightened in environments where network segmentation or monitoring is limited. Although the vulnerability does not directly allow code execution or denial of service, the information disclosure can be a stepping stone for more severe attacks. Given the lack of vendor patching, European organizations must consider the risk of prolonged exposure, especially in sectors with sensitive data such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include isolating the affected device from untrusted networks, restricting remote management access via firewall rules or VPNs, and disabling remote web administration if possible. Network monitoring should be enhanced to detect unusual HTTP requests targeting /live_online.shtml or other suspicious activity. Organizations should consider replacing the Wavlink WL-WN578W2 router with a more secure and actively supported device. If replacement is not feasible, deploying network segmentation to limit the router's exposure and using intrusion detection/prevention systems to block exploit attempts is recommended. Regularly reviewing device firmware updates from Wavlink is essential in case a patch is released. Additionally, educating users about the risks and encouraging strong network security hygiene will help mitigate potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10321: Information Disclosure in Wavlink WL-WN578W2
Description
A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is an unknown function of the file /live_online.shtml. Executing manipulation can lead to information disclosure. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10321 is a medium-severity information disclosure vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The flaw resides in an unspecified function within the /live_online.shtml file, which is part of the device's web interface. An attacker can remotely exploit this vulnerability without requiring authentication or user interaction, by sending crafted requests to the affected endpoint. Successful exploitation results in unauthorized disclosure of sensitive information, which could include configuration details, network information, or other data exposed by the vulnerable web page. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a moderate risk primarily due to its remote exploitability and lack of required privileges, but limited impact on integrity or availability. The vendor, Wavlink, was notified early but has not issued a response or patch, and while a public exploit exists, there are no confirmed reports of active exploitation in the wild at this time. This lack of vendor response increases the risk for users of this device, as no official remediation is currently available.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router, this vulnerability poses a risk of sensitive information leakage that could aid attackers in further compromising network security. Information disclosed might include network configurations, device status, or credentials, which could facilitate lateral movement, targeted attacks, or unauthorized access to internal resources. Small and medium enterprises (SMEs) and home office setups relying on this device without additional security layers are particularly vulnerable. The impact is heightened in environments where network segmentation or monitoring is limited. Although the vulnerability does not directly allow code execution or denial of service, the information disclosure can be a stepping stone for more severe attacks. Given the lack of vendor patching, European organizations must consider the risk of prolonged exposure, especially in sectors with sensitive data such as finance, healthcare, and critical infrastructure.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. These include isolating the affected device from untrusted networks, restricting remote management access via firewall rules or VPNs, and disabling remote web administration if possible. Network monitoring should be enhanced to detect unusual HTTP requests targeting /live_online.shtml or other suspicious activity. Organizations should consider replacing the Wavlink WL-WN578W2 router with a more secure and actively supported device. If replacement is not feasible, deploying network segmentation to limit the router's exposure and using intrusion detection/prevention systems to block exploit attempts is recommended. Regularly reviewing device firmware updates from Wavlink is essential in case a patch is released. Additionally, educating users about the risks and encouraging strong network security hygiene will help mitigate potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T08:22:29.035Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c4a9e26da8ad0abf36f2af
Added to database: 9/12/2025, 11:16:50 PM
Last enriched: 9/12/2025, 11:18:39 PM
Last updated: 10/30/2025, 8:36:36 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.