A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.323751 | Permissions Required VDB Entry |
| https://vuldb.com/?id.323751 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.643436 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.643437 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Oct 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/login/readme.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.323751 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.323751 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.643436 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.643437 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:h:wavlink:wl-wn578w2:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-wn578w2_firmware:m78w2_v221110:*:*:*:*:*:*:* |
|
| First Time |
Wavlink wl-wn578w2 Firmware
Wavlink Wavlink wl-wn578w2 |
12 Sep 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-12 20:15
Updated : 2025-10-02 20:17
NVD link : CVE-2025-10325
Mitre link : CVE-2025-10325
CVE.ORG link : CVE-2025-10325
JSON object : View
Products Affected
wavlink
- wl-wn578w2_firmware
- wl-wn578w2
