Skip to main content

CVE-2025-10322: Weak Password Recovery in Wavlink WL-WN578W2

Medium
VulnerabilityCVE-2025-10322cvecve-2025-10322
Published: Fri Sep 12 2025 (09/12/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN578W2

Description

A vulnerability has been found in Wavlink WL-WN578W2 221110. The affected element is an unknown function of the file /sysinit.html. The manipulation of the argument newpass/confpass leads to weak password recovery. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/12/2025, 18:12:07 UTC

Technical Analysis

CVE-2025-10322 is a medium-severity vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The vulnerability resides in an unknown function within the /sysinit.html file, where manipulation of the parameters newpass and confpass leads to weak password recovery mechanisms. This flaw allows an attacker to remotely exploit the password recovery process without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The weakness implies that an attacker can reset or recover the device's administrative password remotely, potentially gaining unauthorized administrative access to the router. The vendor has been notified but has not responded or issued a patch, and while no known exploits are currently observed in the wild, the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS score of 6.9 reflects a moderate impact primarily on the integrity of the device, with limited impact on confidentiality and availability. The vulnerability does not require user interaction or privileges, making it easier to exploit remotely over the network. This flaw could be leveraged to compromise the router’s configuration, intercept or redirect network traffic, or use the device as a foothold for further network attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security, especially for small and medium enterprises or home offices using Wavlink WL-WN578W2 routers. Successful exploitation could lead to unauthorized administrative access, allowing attackers to alter network configurations, disable security features, or intercept sensitive communications. This undermines the confidentiality and integrity of organizational data and could facilitate lateral movement within corporate networks. Given the remote exploitability and lack of required authentication, attackers could target vulnerable devices en masse, potentially leading to widespread compromise. The absence of a vendor patch increases the exposure window, making timely mitigation critical. Organizations relying on these devices for critical connectivity or remote access may face operational disruptions or data breaches. Additionally, compromised routers could be enlisted in botnets or used to launch further attacks, amplifying the threat landscape within European networks.

Mitigation Recommendations

Organizations should immediately inventory their network infrastructure to identify any Wavlink WL-WN578W2 devices running the affected firmware version 221110. As no official patch is available, mitigation should focus on network-level controls: restrict remote access to router management interfaces by implementing firewall rules that limit access to trusted IP addresses; disable remote management features if not required; change default credentials to strong, unique passwords to reduce the risk of exploitation through other vectors; monitor network traffic for unusual activity indicative of router compromise; and consider segmenting vulnerable devices on isolated network segments to contain potential breaches. Where possible, replace affected devices with models from vendors that provide timely security updates. Additionally, organizations should stay informed on vendor communications for any forthcoming patches or advisories and apply them promptly. Employing intrusion detection systems to flag attempts to exploit this vulnerability can also aid in early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T08:22:32.239Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c461b9b1ab4abecae87e10

Added to database: 9/12/2025, 6:08:57 PM

Last enriched: 9/12/2025, 6:12:07 PM

Last updated: 9/12/2025, 6:12:07 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats