Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2529: Command Injection in Wavlink WL-WN579A3

0
Medium
VulnerabilityCVE-2026-2529cvecve-2026-2529
Published: Mon Feb 16 2026 (02/16/2026, 02:02:08 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN579A3

Description

A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is the function DeleteMac of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list results in command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/16/2026, 02:33:28 UTC

Technical Analysis

CVE-2026-2529 is a command injection vulnerability identified in the Wavlink WL-WN579A3 router firmware versions up to 20210219. The vulnerability resides in the DeleteMac function of the /cgi-bin/wireless.cgi script, which processes the delete_list argument. An attacker can remotely manipulate this argument to inject and execute arbitrary system commands on the device without requiring authentication or user interaction. This remote code execution vector arises from insufficient input validation or sanitization of the delete_list parameter, allowing shell commands to be appended or injected. The vulnerability is accessible over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L but no authentication needed), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L), indicating potential but limited data exposure or service disruption. The vendor was notified but has not responded or provided a patch, leaving devices exposed. No public exploits have been reported yet, but the vulnerability presents a significant risk due to its remote, unauthenticated nature and potential for command execution. Organizations using this device should consider the risk of unauthorized access, network compromise, and potential lateral movement within internal networks.

Potential Impact

For European organizations, exploitation of CVE-2026-2529 could lead to unauthorized remote command execution on affected Wavlink WL-WN579A3 routers, compromising device integrity and potentially disrupting network availability. Attackers could leverage this to alter router configurations, intercept or redirect traffic, or establish persistent footholds within corporate networks. This could result in data breaches, network outages, or serve as a pivot point for further attacks against internal systems. The impact is particularly critical for organizations relying on these routers in sensitive environments such as government agencies, critical infrastructure, or enterprises with remote branch offices. The lack of vendor response and patch availability increases exposure duration, raising the risk of exploitation. Additionally, compromised routers could be used in botnets or for launching attacks against other targets, amplifying the threat landscape in Europe.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately isolate affected Wavlink WL-WN579A3 devices from untrusted networks, especially the internet, by disabling remote management interfaces or restricting access via firewall rules. 2) Replace or upgrade the firmware if a vendor patch becomes available; in the absence of a patch, consider replacing the device with a secure alternative. 3) Employ network segmentation to limit the exposure of vulnerable devices to critical internal systems. 4) Monitor network traffic for unusual patterns or command injection attempts targeting the /cgi-bin/wireless.cgi endpoint. 5) Use intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify exploitation attempts. 6) Enforce strict access controls and logging on network devices to detect unauthorized configuration changes. 7) Educate IT staff about this vulnerability and ensure incident response plans include steps for compromised network devices. These targeted actions go beyond generic advice by focusing on device isolation, monitoring, and replacement strategies tailored to this specific router and vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:01:34.854Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69927ea0bda29fb02f12609a

Added to database: 2/16/2026, 2:19:12 AM

Last enriched: 2/16/2026, 2:33:28 AM

Last updated: 2/21/2026, 12:18:51 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats