Wl Wn579a3 Firmware

8 CVEs product

Monthly

CVE-2026-2530 MEDIUM POC This Month

The WL-WN579A3 wireless router firmware contains a command injection vulnerability in the AddMac function of /cgi-bin/wireless.cgi that allows authenticated remote attackers to execute arbitrary commands with medium impact on confidentiality, integrity, and availability. Public exploit code is available for this vulnerability, and no patch has been released despite vendor notification. Affected systems running firmware versions up to 20210219 require immediate mitigation through network segmentation or device replacement.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-2529 MEDIUM POC This Month

Unauthenticated command injection in the wireless configuration interface of Wavlink WL-WN579A3 firmware allows remote attackers to execute arbitrary commands through the delete_list parameter. Public exploit code is available for this vulnerability, and no patch has been released by the vendor despite early notification. Affected devices can be compromised remotely to gain full system access with minimal authentication requirements.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-2528 MEDIUM POC This Month

Command injection in the Wavlink WL-WN579A3 wireless router firmware allows authenticated remote attackers to execute arbitrary commands through the delete_list parameter in the /cgi-bin/wireless.cgi endpoint. Public exploit code exists for this vulnerability, and no vendor patch is currently available. Affected devices running firmware versions up to 20210219 face risk of complete system compromise from authenticated network access.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-2527 MEDIUM POC This Month

Wl-Wn579A3 Firmware versions up to 20210219. contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.4%
CVE-2026-2526 MEDIUM POC This Month

Command injection in Wavlink WL-WN579A3 firmware through the SSID2G2 parameter of /cgi-bin/wireless.cgi allows authenticated remote attackers to execute arbitrary commands with limited privileges. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor. The flaw affects confidentiality, integrity, and availability of affected devices.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.4%
CVE-2025-44882 CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/firewall.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

Command Injection Wl Wn579a3 Firmware
NVD
CVSS 3.1
9.8
EPSS
13.0%
CVE-2025-44880 CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/adm.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

Command Injection Wl Wn579a3 Firmware
NVD
CVSS 3.1
9.8
EPSS
13.0%
CVE-2025-44881 CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/qos.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

RCE Command Injection Code Injection Wl Wn579a3 Firmware
NVD
CVSS 3.1
9.8
EPSS
13.0%
CVE-2026-2530
EPSS 0% CVSS 6.3
MEDIUM POC This Month

The WL-WN579A3 wireless router firmware contains a command injection vulnerability in the AddMac function of /cgi-bin/wireless.cgi that allows authenticated remote attackers to execute arbitrary commands with medium impact on confidentiality, integrity, and availability. Public exploit code is available for this vulnerability, and no patch has been released despite vendor notification. Affected systems running firmware versions up to 20210219 require immediate mitigation through network segmentation or device replacement.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVE-2026-2529
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Unauthenticated command injection in the wireless configuration interface of Wavlink WL-WN579A3 firmware allows remote attackers to execute arbitrary commands through the delete_list parameter. Public exploit code is available for this vulnerability, and no patch has been released by the vendor despite early notification. Affected devices can be compromised remotely to gain full system access with minimal authentication requirements.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVE-2026-2528
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in the Wavlink WL-WN579A3 wireless router firmware allows authenticated remote attackers to execute arbitrary commands through the delete_list parameter in the /cgi-bin/wireless.cgi endpoint. Public exploit code exists for this vulnerability, and no vendor patch is currently available. Affected devices running firmware versions up to 20210219 face risk of complete system compromise from authenticated network access.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVE-2026-2527
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Wl-Wn579A3 Firmware versions up to 20210219. contains a vulnerability that allows attackers to command injection (CVSS 6.3).

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVE-2026-2526
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Command injection in Wavlink WL-WN579A3 firmware through the SSID2G2 parameter of /cgi-bin/wireless.cgi allows authenticated remote attackers to execute arbitrary commands with limited privileges. Public exploit code exists for this vulnerability, and no patch is currently available from the vendor. The flaw affects confidentiality, integrity, and availability of affected devices.

Command Injection Wl Wn579a3 Firmware
NVD GitHub VulDB
CVE-2025-44882
EPSS 13% CVSS 9.8
CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/firewall.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

Command Injection Wl Wn579a3 Firmware
NVD
CVE-2025-44880
EPSS 13% CVSS 9.8
CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/adm.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

Command Injection Wl Wn579a3 Firmware
NVD
CVE-2025-44881
EPSS 13% CVSS 9.8
CRITICAL POC THREAT Act Now

A command injection vulnerability in the component /cgi-bin/qos.cgi of Wavlink WL-WN579A3 v1.0 allows attackers to execute arbitrary commands via a crafted input. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 13.0%.

RCE Command Injection Code Injection +1
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy