Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10358: OS Command Injection in Wavlink WL-WN578W2

0
Medium
VulnerabilityCVE-2025-10358cvecve-2025-10358
Published: Sat Sep 13 2025 (09/13/2025, 08:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN578W2

Description

A security vulnerability has been detected in Wavlink WL-WN578W2 221110. This affects the function sub_404850 of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:37:11 UTC

Technical Analysis

CVE-2025-10358 is a security vulnerability identified in the Wavlink WL-WN578W2 wireless router, specifically in version 221110. The vulnerability resides in the /cgi-bin/wireless.cgi script, within the function sub_404850. It arises from improper handling of the 'delete_list' argument, which allows an attacker to perform OS command injection. This means that an attacker can craft malicious input to execute arbitrary operating system commands on the device remotely, without requiring any authentication or user interaction. The vulnerability is remotely exploitable over the network (AV:N), with low attack complexity (AC:L), and no privileges or user interaction needed (PR:N/UI:N). The impact on confidentiality, integrity, and availability is low to limited (VC:L/VI:L/VA:L), indicating that while the attacker can execute commands, the scope of damage may be somewhat constrained by the device's environment or built-in protections. The vendor was informed but did not respond or provide a patch, and no known exploits are currently observed in the wild. The CVSS 4.0 base score is 6.9, categorizing it as a medium severity vulnerability. The public disclosure of the exploit code increases the risk of exploitation, especially given the lack of vendor mitigation. The vulnerability affects a specific firmware version, and the attack vector is network-based, making it a significant concern for exposed devices.

Potential Impact

For European organizations using the Wavlink WL-WN578W2 router with the affected firmware, this vulnerability poses a tangible risk. Successful exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to unauthorized access to the internal network, interception or manipulation of network traffic, or disruption of network services. This could compromise the confidentiality and integrity of sensitive data transmitted through the network and impact availability if the device is destabilized or taken offline. Small and medium enterprises, home offices, and branch offices relying on this router model without timely firmware updates are particularly vulnerable. The lack of vendor response and patch availability exacerbates the risk, as organizations cannot rely on official fixes. Additionally, the public disclosure of exploit details may attract opportunistic attackers targeting exposed devices in Europe, where Wavlink products have market presence. The impact is heightened in sectors with stringent data protection requirements under GDPR, as exploitation could lead to data breaches and regulatory penalties.

Mitigation Recommendations

Given the absence of an official patch from the vendor, European organizations should take immediate and specific actions beyond generic advice: 1) Identify and inventory all Wavlink WL-WN578W2 devices running firmware version 221110 within their networks. 2) Isolate affected devices from untrusted networks, especially the internet, by implementing network segmentation and firewall rules restricting access to the router's management interfaces and CGI endpoints. 3) Disable remote management features if enabled, particularly access to /cgi-bin/wireless.cgi or similar CGI scripts. 4) Monitor network traffic for unusual or suspicious requests targeting the vulnerable CGI endpoint, employing intrusion detection systems with custom signatures if possible. 5) Consider replacing the affected devices with alternative hardware from vendors with active security support if patching is not forthcoming. 6) Regularly check for updates from Wavlink or trusted security advisories for any forthcoming patches or mitigations. 7) Educate IT staff about the vulnerability and the importance of restricting access to network devices. These steps will help reduce the attack surface and mitigate exploitation risks until a vendor patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T12:42:28.808Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c52813e14ebf9f5cc434f1

Added to database: 9/13/2025, 8:15:15 AM

Last enriched: 9/21/2025, 12:37:11 AM

Last updated: 10/29/2025, 9:29:45 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats