A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddMac of the file /cgi-bin/wireless.cgi. This manipulation of the argument macAddr causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.346118 | Permissions Required VDB Entry |
| https://vuldb.com/?id.346118 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.748077 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Feb 2026, 19:43
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wavlink wl-wn579a3 Firmware
Wavlink Wavlink wl-wn579a3 |
|
| CPE | cpe:2.3:o:wavlink:wl-wn579a3_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wavlink:wl-wn579a3:-:*:*:*:*:*:*:* |
|
| References | () https://github.com/MRAdera/IoT-Vuls/blob/main/wavlink/wn579a3/AddMac.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.346118 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.346118 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.748077 - Third Party Advisory, VDB Entry |
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Feb 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-16 04:15
Updated : 2026-02-18 19:43
NVD link : CVE-2026-2530
Mitre link : CVE-2026-2530
CVE.ORG link : CVE-2026-2530
JSON object : View
Products Affected
wavlink
- wl-wn579a3_firmware
- wl-wn579a3
