CVE-2025-10358: OS Command Injection in Wavlink WL-WN578W2
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10358 is a security vulnerability identified in the Wavlink WL-WN578W2 wireless router, specifically in firmware version 221110. The vulnerability exists in the /cgi-bin/wireless.cgi script, within the function sub_404850. It arises from improper handling of the 'delete_list' argument, which can be manipulated to perform OS command injection. This means an attacker can remotely execute arbitrary operating system commands on the affected device without any authentication or user interaction. The vulnerability is remotely exploitable over the network, making it a significant risk for exposed devices. The vendor has been notified but has not responded or issued a patch, and while no known exploits are currently observed in the wild, public disclosure of the exploit code increases the risk of exploitation. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector network, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to gain control over the device, potentially leading to further network compromise, data interception, or disruption of network services.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router with the affected firmware, this vulnerability poses a tangible risk. Successful exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept or manipulate internal communications, launch further attacks within the network, or disrupt connectivity. This is particularly critical for small and medium enterprises or branch offices that rely on consumer-grade routers without advanced security controls. The lack of vendor response and patch availability increases exposure time. Additionally, if these devices are deployed in critical infrastructure sectors or government offices, the impact could extend to sensitive data breaches or operational disruptions. Given the remote exploitability without authentication, attackers can scan for vulnerable devices across Europe and compromise them en masse, potentially creating botnets or launching targeted attacks.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected Wavlink WL-WN578W2 devices from public internet access by placing them behind firewalls or VPNs to restrict remote access to the management interface. Network administrators should disable remote management features if enabled. Monitoring network traffic for unusual command execution patterns or unexpected outbound connections from these devices is advised. Since no official patch is available, consider replacing affected devices with models from vendors with active security support. If replacement is not feasible, applying custom firmware or third-party security patches (if available and trustworthy) could be an option. Regularly audit network devices for firmware versions and maintain an inventory to quickly identify vulnerable units. Finally, educate staff on the risks of using consumer-grade routers in sensitive environments and enforce strict network segmentation to limit potential lateral movement from compromised devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-10358: OS Command Injection in Wavlink WL-WN578W2
Description
A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10358 is a security vulnerability identified in the Wavlink WL-WN578W2 wireless router, specifically in firmware version 221110. The vulnerability exists in the /cgi-bin/wireless.cgi script, within the function sub_404850. It arises from improper handling of the 'delete_list' argument, which can be manipulated to perform OS command injection. This means an attacker can remotely execute arbitrary operating system commands on the affected device without any authentication or user interaction. The vulnerability is remotely exploitable over the network, making it a significant risk for exposed devices. The vendor has been notified but has not responded or issued a patch, and while no known exploits are currently observed in the wild, public disclosure of the exploit code increases the risk of exploitation. The CVSS v4.0 base score is 6.9, indicating a medium severity level, with attack vector network, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to gain control over the device, potentially leading to further network compromise, data interception, or disruption of network services.
Potential Impact
For European organizations using the Wavlink WL-WN578W2 router with the affected firmware, this vulnerability poses a tangible risk. Successful exploitation could lead to unauthorized control over network infrastructure, enabling attackers to intercept or manipulate internal communications, launch further attacks within the network, or disrupt connectivity. This is particularly critical for small and medium enterprises or branch offices that rely on consumer-grade routers without advanced security controls. The lack of vendor response and patch availability increases exposure time. Additionally, if these devices are deployed in critical infrastructure sectors or government offices, the impact could extend to sensitive data breaches or operational disruptions. Given the remote exploitability without authentication, attackers can scan for vulnerable devices across Europe and compromise them en masse, potentially creating botnets or launching targeted attacks.
Mitigation Recommendations
Immediate mitigation steps include isolating the affected Wavlink WL-WN578W2 devices from public internet access by placing them behind firewalls or VPNs to restrict remote access to the management interface. Network administrators should disable remote management features if enabled. Monitoring network traffic for unusual command execution patterns or unexpected outbound connections from these devices is advised. Since no official patch is available, consider replacing affected devices with models from vendors with active security support. If replacement is not feasible, applying custom firmware or third-party security patches (if available and trustworthy) could be an option. Regularly audit network devices for firmware versions and maintain an inventory to quickly identify vulnerable units. Finally, educate staff on the risks of using consumer-grade routers in sensitive environments and enforce strict network segmentation to limit potential lateral movement from compromised devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T12:42:28.808Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c52813e14ebf9f5cc434f1
Added to database: 9/13/2025, 8:15:15 AM
Last enriched: 9/13/2025, 8:30:11 AM
Last updated: 9/13/2025, 9:37:43 AM
Views: 3
Related Threats
CVE-2025-10340: Cross Site Scripting in WhatCD Gazelle
MediumCVE-2025-10332: Cross Site Scripting in cdevroe unmark
MediumCVE-2025-10331: Cross Site Scripting in cdevroe unmark
MediumCVE-2025-10298
UnknownCVE-2025-4974
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.