CVE-2026-4164

critical

Description

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component.

References

https://vuldb.com/?submit.768294

https://vuldb.com/?submit.768293

https://vuldb.com/?submit.768292

https://vuldb.com/?id.351071

https://vuldb.com/?ctiid.351071

https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_2/README.md

https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_1/README.md

https://dl.wavlink.com/firmware/RD/WINSTAR_WN578W2-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin

Details

Source: Mitre, NVD

Published: 2026-03-15

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

CVSS v4

Base Score: 9.3

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Severity: Critical

EPSS

EPSS: 0.00167