CVE-2026-2529
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely execute commands on the Wavlink WL-WN579A3 router by exploiting a flaw in the firmware that allows them to manipulate a specific setting. This vulnerability affects devices running firmware versions up to February 19, 2021, and requires the attacker to send specially crafted requests to the router.
Technical Description
A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is the function DeleteMac of the file /cgi-bin/wireless.cgi. The manipulation of the argument delete_list results in command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago
Vendor
wavlink
Product
wl-wn579a3 firmware
Related Vulnerabilities
This vulnerability allows an attacker to execute cross-site scripting (XSS) attacks remotely by manipulating the Hostname argument in the device's firmware. To exploit this, the attacker needs to send a specially crafted request to the affected device, which can lead to unauthorized actions or data theft from users interacting with the device.
An attacker can remotely exploit a vulnerability in the Wavlink WL-WN579X3-C firmware to execute arbitrary code on the device by manipulating a specific setting, which could lead to full control over the device. To protect against this risk, users should upgrade to the latest firmware version as soon as possible.
An attacker can remotely execute commands on the Wavlink WL-NU516U1 device by manipulating a specific setting in its firmware. This vulnerability requires no special access, making it a significant risk for anyone using this device.
An attacker can remotely execute arbitrary commands on the Wavlink WL-NU516U1 device due to a flaw in its firmware that allows them to manipulate a specific function. This vulnerability requires no special access, making it relatively easy for an attacker to exploit if they know how.
An attacker can remotely execute malicious commands on the Wavlink WL-NU516U1 device by exploiting a flaw in its firewall settings. This vulnerability can be triggered by manipulating a specific input, and it affects devices with firmware versions up to December 8, 2025.