CVE-2025-50756

| EUVD-2025-21351 CRITICAL
2025-07-14 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2025-21351
PoC Detected
Oct 03, 2025 - 00:43 vuln.today
Public exploit code
CVE Published
Jul 14, 2025 - 15:15 nvd
CRITICAL 9.8

Description

Wavlink WN535K3 20191010 was found to contain a command injection vulnerability in the set_sys_adm function via the newpass parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

Analysis

CVE-2025-50756 is a critical unauthenticated command injection vulnerability in the Wavlink WN535K3 router (firmware version 20191010) affecting the set_sys_adm function's newpass parameter. An unauthenticated remote attacker can execute arbitrary system commands with root privileges by sending a crafted request, enabling complete device compromise including data theft, malware installation, and lateral network movement. The CVSS 9.8 score reflects maximum severity; KEV status and active exploitation likelihood are elevated given the high exploitability characteristics (network-accessible, no authentication required, low attack complexity).

Technical Context

The vulnerability stems from improper input validation and sanitization in the set_sys_adm administrative function, classified as CWE-77 (Improper Neutralization of Special Elements used in a Command). The Wavlink WN535K3 is a consumer-grade WiFi router running embedded Linux firmware. The newpass parameter, intended for password updates, fails to properly escape or filter shell metacharacters and command separators (e.g., semicolons, pipes, command substitution operators), allowing OS command injection. The firmware version 20191010 indicates this is legacy hardware; affected CPE would be: cpe:2.3:o:wavlink:wn535k3_firmware:20191010:*:*:*:*:*:*:*. The vulnerability likely exists in the HTTP/HTTPS web interface or UPnP service that handles administrative requests, common attack surfaces for router exploitation.

Affected Products

Wavlink WN535K3 WiFi Router, firmware version 20191010 and potentially earlier/later versions in the same release branch. CPE: cpe:2.3:o:wavlink:wn535k3_firmware:20191010:*:*:*:*:*:*:*. Wavlink as a vendor primarily serves budget consumer and small business markets; devices are distributed globally through e-commerce channels. No vendor advisory links provided in the source data; organizations should contact Wavlink support (support.wavlink.com) or check their security advisories page for official guidance. All instances of this hardware model running vulnerable firmware versions should be inventoried, particularly in organizational networks, IoT deployments, and edge locations.

Remediation

Immediate Actions: (1) Check Wavlink's official firmware repository and security advisory page for patched firmware versions newer than 20191010—download and apply via the device's web interface (System Settings > Firmware Update) or via TFTP if web interface is compromised; (2) If no patch is available, implement network-level mitigations: restrict HTTP/HTTPS access to the router's management interface via firewall rules (limit to trusted administrative subnets only), disable remote management features in router settings, and segment the router's management network from general user traffic; (3) Change default credentials immediately if not already done; (4) Isolate affected devices to air-gapped or highly restricted networks if patching is unavailable; (5) Long-term: replace end-of-life hardware with modern routers receiving active firmware updates (Wavlink models post-2020+ with active vendor support). Contact Wavlink technical support at support.wavlink.com or [email protected] for patch availability confirmation and extended support options.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +1.3
CVSS: +49
POC: +20

Share

CVE-2025-50756 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy