CVE-2025-10325: Command Injection in Wavlink WL-WN578W2
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10325 is a command injection vulnerability found in the Wavlink WL-WN578W2 wireless router, specifically in firmware version 221110. The vulnerability resides in the /cgi-bin/login.cgi script, within the functions sub_401340 and sub_401BA4. The issue arises from improper sanitization of the 'ipaddr' argument, which can be manipulated by an attacker to inject arbitrary OS commands. This flaw allows remote attackers to execute commands on the device without requiring authentication or user interaction, as the attack vector is network accessible (AV:N) and has low complexity (AC:L). The CVSS v4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability, and the absence of privilege escalation or user interaction requirements. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, increasing the risk of exploitation. The vulnerability could be leveraged to gain control over the affected router, potentially enabling attackers to intercept network traffic, pivot to internal networks, or disrupt network availability. However, no known exploits in the wild have been reported to date.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using the Wavlink WL-WN578W2 router model in their network infrastructure. Successful exploitation could lead to unauthorized command execution on the router, compromising network perimeter security. This may result in interception or manipulation of sensitive data, unauthorized network access, or denial of service conditions. Small and medium enterprises or branch offices that deploy this consumer-grade or SMB-grade router without additional security controls are particularly vulnerable. The lack of vendor response and patch availability increases the window of exposure. Given the remote attack vector and no authentication requirement, attackers can exploit this vulnerability from anywhere, potentially targeting European networks. However, the medium CVSS score suggests the impact is somewhat limited, possibly due to constrained command execution capabilities or partial mitigations inherent in the device. Still, the threat could be leveraged as a foothold in broader attack campaigns against European organizations, especially those with weak network segmentation or outdated device inventories.
Mitigation Recommendations
Organizations should immediately identify any deployments of the Wavlink WL-WN578W2 router with firmware version 221110. Since no official patch is available, mitigation should focus on network-level controls: restrict remote access to the router's management interface by implementing firewall rules that limit access to trusted IP addresses or internal networks only. Disable remote management features if not required. Monitor network traffic for unusual patterns indicative of command injection attempts targeting the /cgi-bin/login.cgi endpoint. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for command injection attacks. Consider replacing affected devices with models from vendors that provide timely security updates. Additionally, segment critical network assets behind more secure firewalls and avoid exposing vulnerable devices directly to the internet. Maintain an up-to-date asset inventory and enforce strict configuration management to prevent unauthorized firmware versions. Finally, engage with Wavlink or authorized distributors to request security updates or advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-10325: Command Injection in Wavlink WL-WN578W2
Description
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10325 is a command injection vulnerability found in the Wavlink WL-WN578W2 wireless router, specifically in firmware version 221110. The vulnerability resides in the /cgi-bin/login.cgi script, within the functions sub_401340 and sub_401BA4. The issue arises from improper sanitization of the 'ipaddr' argument, which can be manipulated by an attacker to inject arbitrary OS commands. This flaw allows remote attackers to execute commands on the device without requiring authentication or user interaction, as the attack vector is network accessible (AV:N) and has low complexity (AC:L). The CVSS v4.0 base score is 5.3 (medium severity), reflecting limited impact on confidentiality, integrity, and availability, and the absence of privilege escalation or user interaction requirements. Although the vendor was notified early, no response or patch has been provided, and a public exploit is available, increasing the risk of exploitation. The vulnerability could be leveraged to gain control over the affected router, potentially enabling attackers to intercept network traffic, pivot to internal networks, or disrupt network availability. However, no known exploits in the wild have been reported to date.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially for those using the Wavlink WL-WN578W2 router model in their network infrastructure. Successful exploitation could lead to unauthorized command execution on the router, compromising network perimeter security. This may result in interception or manipulation of sensitive data, unauthorized network access, or denial of service conditions. Small and medium enterprises or branch offices that deploy this consumer-grade or SMB-grade router without additional security controls are particularly vulnerable. The lack of vendor response and patch availability increases the window of exposure. Given the remote attack vector and no authentication requirement, attackers can exploit this vulnerability from anywhere, potentially targeting European networks. However, the medium CVSS score suggests the impact is somewhat limited, possibly due to constrained command execution capabilities or partial mitigations inherent in the device. Still, the threat could be leveraged as a foothold in broader attack campaigns against European organizations, especially those with weak network segmentation or outdated device inventories.
Mitigation Recommendations
Organizations should immediately identify any deployments of the Wavlink WL-WN578W2 router with firmware version 221110. Since no official patch is available, mitigation should focus on network-level controls: restrict remote access to the router's management interface by implementing firewall rules that limit access to trusted IP addresses or internal networks only. Disable remote management features if not required. Monitor network traffic for unusual patterns indicative of command injection attempts targeting the /cgi-bin/login.cgi endpoint. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for command injection attacks. Consider replacing affected devices with models from vendors that provide timely security updates. Additionally, segment critical network assets behind more secure firewalls and avoid exposing vulnerable devices directly to the internet. Maintain an up-to-date asset inventory and enforce strict configuration management to prevent unauthorized firmware versions. Finally, engage with Wavlink or authorized distributors to request security updates or advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T08:22:41.117Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c4832aefb44f63f386e3fc
Added to database: 9/12/2025, 8:31:38 PM
Last enriched: 9/12/2025, 8:31:56 PM
Last updated: 9/12/2025, 8:32:00 PM
Views: 2
Related Threats
CVE-2025-10328: OS Command Injection in MiczFlor RPi-Jukebox-RFID
MediumCVE-2025-10176: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in tvcnet The Hack Repair Guy's Plugin Archiver
HighCVE-2025-43795: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Liferay Portal
MediumCVE-2025-45587: n/a
HighCVE-2025-45586: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.