Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2528: Command Injection in Wavlink WL-WN579A3

0
Medium
VulnerabilityCVE-2026-2528cvecve-2026-2528
Published: Mon Feb 16 2026 (02/16/2026, 02:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN579A3

Description

A vulnerability was identified in Wavlink WL-WN579A3 up to 20210219. Affected by this vulnerability is the function Delete_Mac_list of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:15:52 UTC

Technical Analysis

CVE-2026-2528 is a command injection vulnerability identified in the Wavlink WL-WN579A3 wireless router, specifically in the Delete_Mac_list function within the /cgi-bin/wireless.cgi script. The vulnerability is triggered by manipulating the delete_list argument, which is not properly sanitized, allowing an attacker to inject and execute arbitrary system commands remotely. The attack vector is network-based, requiring no authentication or user interaction, making it highly accessible to remote attackers. The affected firmware version is up to 20210219, and the vendor has not responded to disclosure requests, leaving the vulnerability unpatched. The CVSS 4.0 score of 5.3 indicates medium severity, reflecting the ease of exploitation but limited impact scope due to the specific device affected. Publicly available exploits increase the risk of exploitation, although no confirmed widespread attacks have been reported. Successful exploitation could allow attackers to gain control over the router, manipulate network traffic, create persistent backdoors, or pivot to internal networks. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls. This vulnerability highlights the risks of embedded device command injection flaws and the importance of secure input validation in network device management interfaces.

Potential Impact

The impact of CVE-2026-2528 on organizations using the Wavlink WL-WN579A3 router can be significant. Exploitation allows remote attackers to execute arbitrary commands on the device without authentication, potentially leading to full device compromise. Attackers could alter network configurations, intercept or redirect traffic, deploy malware, or use the compromised router as a foothold for lateral movement within corporate or home networks. This could result in data breaches, service disruptions, or unauthorized access to sensitive internal systems. Given the router’s role as a network gateway, the vulnerability undermines both confidentiality and integrity of network communications. The availability of public exploits increases the likelihood of opportunistic attacks, especially in environments where these routers are deployed without adequate network segmentation or monitoring. The absence of vendor patches means affected organizations must rely on mitigations or device replacement, increasing operational costs and risk exposure. Overall, the vulnerability poses a medium-level threat with potential for serious consequences if exploited in targeted attacks or widespread campaigns.

Mitigation Recommendations

To mitigate CVE-2026-2528, organizations should take immediate steps beyond generic advice: 1) Identify all Wavlink WL-WN579A3 devices running firmware up to 20210219 within the network. 2) Restrict remote and local access to the router’s management interface by implementing network segmentation and firewall rules limiting access to trusted administrators only. 3) Disable remote management features if not strictly necessary to reduce exposure. 4) Monitor network traffic and device logs for unusual commands or access patterns indicative of exploitation attempts. 5) Where possible, replace affected devices with models from vendors that provide timely security updates and have a strong security track record. 6) If device replacement is not immediately feasible, consider deploying network-based intrusion detection/prevention systems (IDS/IPS) with signatures targeting known exploit patterns for this vulnerability. 7) Maintain strict control over physical access to devices to prevent local exploitation. 8) Engage with Wavlink support channels persistently to seek firmware updates or official guidance. These targeted actions help reduce the attack surface and limit the potential impact until a vendor patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:01:32.163Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69927ea0bda29fb02f126094

Added to database: 2/16/2026, 2:19:12 AM

Last enriched: 2/23/2026, 9:15:52 PM

Last updated: 4/6/2026, 4:33:29 PM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses