Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10359: OS Command Injection in Wavlink WL-WN578W2

0
Medium
VulnerabilityCVE-2025-10359cvecve-2025-10359
Published: Sat Sep 13 2025 (09/13/2025, 13:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN578W2

Description

A vulnerability was detected in Wavlink WL-WN578W2 221110. This impacts the function sub_404DBC of the file /cgi-bin/wireless.cgi. The manipulation of the argument macAddr results in os command injection. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:40:10 UTC

Technical Analysis

CVE-2025-10359 is a remote OS command injection vulnerability affecting the Wavlink WL-WN578W2 wireless router, specifically version 221110. The vulnerability resides in the function sub_404DBC within the /cgi-bin/wireless.cgi script. An attacker can manipulate the macAddr argument passed to this CGI endpoint, which is not properly sanitized, allowing arbitrary OS commands to be executed on the device. This type of vulnerability enables an unauthenticated remote attacker to execute commands with the privileges of the web server process, potentially leading to full device compromise. The vulnerability has a CVSS 4.0 base score of 6.9 (medium severity), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no confirmed in-the-wild attacks have been reported yet. The vendor, Wavlink, was notified early but has not responded or issued a patch, leaving affected devices exposed. Given the device’s role as a wireless router, successful exploitation could allow attackers to manipulate network traffic, intercept sensitive data, or pivot into internal networks. The lack of vendor response and public exploit availability heightens the urgency for mitigation by users and administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for small and medium enterprises (SMEs) and home office environments that rely on Wavlink WL-WN578W2 routers for network connectivity. Exploitation could lead to unauthorized network access, interception of confidential communications, and potential lateral movement within corporate networks. This could compromise data confidentiality and integrity, disrupt availability of network services, and facilitate further attacks such as malware deployment or data exfiltration. The impact is particularly critical in sectors handling sensitive personal data under GDPR, such as healthcare, finance, and legal services. Additionally, compromised routers could be leveraged as part of botnets or for launching attacks against other targets, amplifying the threat landscape in Europe. The absence of vendor patches means organizations must rely on network-level mitigations and device replacement to reduce exposure.

Mitigation Recommendations

Given the lack of an official patch from Wavlink, European organizations should implement the following specific mitigations: 1) Immediately isolate affected WL-WN578W2 devices from critical network segments and the internet where possible. 2) Replace vulnerable routers with devices from vendors that provide timely security updates and have a strong security track record. 3) If replacement is not immediately feasible, restrict access to the router’s management interface by implementing strict firewall rules allowing only trusted IP addresses. 4) Monitor network traffic for unusual patterns indicative of exploitation attempts, such as unexpected outbound connections or command execution signatures. 5) Disable remote management features on the router to reduce attack surface. 6) Employ network segmentation to limit potential lateral movement from compromised devices. 7) Regularly audit and update network device inventories to identify vulnerable hardware. 8) Educate IT staff and users about the risks associated with this vulnerability and the importance of timely device updates or replacements.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T12:42:31.682Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c56e63e14ebf9f5cc60d82

Added to database: 9/13/2025, 1:15:15 PM

Last enriched: 9/21/2025, 12:40:10 AM

Last updated: 10/30/2025, 2:09:59 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats