Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2530: Command Injection in Wavlink WL-WN579A3

0
Medium
VulnerabilityCVE-2026-2530cvecve-2026-2530
Published: Mon Feb 16 2026 (02/16/2026, 02:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-WN579A3

Description

A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddMac of the file /cgi-bin/wireless.cgi. This manipulation of the argument macAddr causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/16/2026, 03:33:45 UTC

Technical Analysis

CVE-2026-2530 identifies a command injection vulnerability in the Wavlink WL-WN579A3 router firmware versions up to 20210219. The vulnerability resides in the AddMac function of the /cgi-bin/wireless.cgi script, which processes the macAddr parameter insecurely. An attacker can remotely manipulate this parameter to inject and execute arbitrary system commands on the device without requiring authentication or user interaction. This vulnerability allows an attacker to gain control over the router, potentially enabling network reconnaissance, traffic interception, or pivoting to other internal systems. The vendor was notified early but has not issued any patches or advisories, and a public exploit is available, increasing the risk of exploitation. The CVSS v4.0 score of 5.3 reflects a medium severity, considering the attack vector is network-based with low complexity and no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. The vulnerability affects a widely deployed consumer and small business router model, making it a significant concern for environments relying on this hardware for network connectivity. The lack of vendor response and patch availability necessitates immediate defensive measures by users and administrators.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized remote command execution on affected Wavlink WL-WN579A3 routers. Successful exploitation could lead to full compromise of the router, enabling attackers to intercept or manipulate network traffic, disrupt network availability, or use the device as a foothold for further attacks within the internal network. This is particularly concerning for small and medium enterprises or branch offices relying on these routers for critical connectivity. The absence of vendor patches increases the window of exposure. Confidentiality may be impacted through traffic interception, integrity through unauthorized configuration changes, and availability if the device is disabled or misused. The medium CVSS score reflects moderate impact, but the ease of exploitation and public exploit availability elevate the practical risk. European organizations with limited network segmentation or monitoring may be especially vulnerable to lateral movement and data exfiltration attempts stemming from this flaw.

Mitigation Recommendations

1. Immediately isolate Wavlink WL-WN579A3 devices from untrusted networks, especially the internet, to prevent remote exploitation. 2. Disable remote management interfaces and restrict access to the router's administrative functions to trusted internal IPs only. 3. Implement network segmentation to limit the impact of a compromised router on critical internal systems. 4. Monitor network traffic for unusual command execution patterns or unexpected outbound connections originating from these devices. 5. Replace affected devices with routers from vendors that provide timely security updates if no patch is forthcoming. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting known exploits of this vulnerability. 7. Regularly audit router configurations and logs for signs of compromise. 8. Engage with Wavlink support channels to seek updates or official mitigation guidance. 9. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving compromised network infrastructure devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:01:37.444Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69928cafbda29fb02f1ec4ff

Added to database: 2/16/2026, 3:19:11 AM

Last enriched: 2/16/2026, 3:33:45 AM

Last updated: 2/21/2026, 12:18:51 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats