Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2528: Command Injection in Wavlink WL-WN579A3

0
Medium
VulnerabilityCVE-2026-2528cvecve-2026-2528
Published: Mon Feb 16 2026 (02/16/2026, 02:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN579A3

Description

A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability is the function Delete_Mac_list of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/16/2026, 02:33:57 UTC

Technical Analysis

CVE-2026-2528 is a command injection vulnerability found in the Wavlink WL-WN579A3 router, specifically in the Delete_Mac_list function of the /cgi-bin/wireless.cgi endpoint. The vulnerability arises from improper sanitization of the delete_list parameter, which an attacker can manipulate to inject arbitrary shell commands. This flaw allows remote attackers to execute commands on the device with the privileges of the web server process, potentially leading to full device compromise. The vulnerability requires no authentication or user interaction, making it highly accessible for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges but some access needed), no user interaction (UI:N), and partial impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the CVSS score is medium (5.3), the availability of a public exploit increases the threat level. The vendor was notified but has not issued any patches or advisories, leaving affected devices exposed. Exploitation could allow attackers to execute arbitrary commands, modify configurations, disrupt network operations, or pivot into internal networks. The vulnerability affects firmware versions up to 20210219, and no mitigations or updates have been published by Wavlink to date.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those deploying Wavlink WL-WN579A3 routers in their network infrastructure. Successful exploitation could lead to unauthorized remote control of network devices, enabling attackers to intercept or manipulate network traffic, disrupt connectivity, or use the compromised device as a foothold for further attacks within the corporate network. This could impact confidentiality by exposing sensitive data, integrity by altering network configurations or data flows, and availability by causing denial of service or network outages. Critical sectors such as finance, healthcare, and government agencies that rely on stable and secure network infrastructure could face operational disruptions and data breaches. The lack of vendor response and patches increases the window of exposure, making timely mitigation essential. Additionally, the public availability of exploits lowers the barrier for attackers, including cybercriminals and state-sponsored actors, to target vulnerable devices across Europe.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately disable remote management interfaces on Wavlink WL-WN579A3 devices to prevent external exploitation. 2) Restrict network access to the router’s management interface by implementing strict firewall rules and network segmentation, isolating these devices from critical internal networks. 3) Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from these routers. 4) Replace affected devices with models from vendors that provide timely security updates if possible. 5) If replacement is not immediately feasible, consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting the /cgi-bin/wireless.cgi endpoint. 6) Maintain an inventory of all Wavlink devices and verify firmware versions to identify vulnerable units. 7) Engage with Wavlink support channels regularly for any forthcoming patches or advisories. 8) Educate IT staff on this vulnerability and ensure incident response plans include steps for potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:01:32.163Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69927ea0bda29fb02f126094

Added to database: 2/16/2026, 2:19:12 AM

Last enriched: 2/16/2026, 2:33:57 AM

Last updated: 2/21/2026, 12:20:11 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats