๐Ÿ” CVE Alert

CVE-2026-4163

CRITICAL 9.8

Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi command injection

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

CWE CWE-77 CWE-74
Vendor wavlink
Product wl-wn579a3
Published Mar 14, 2026
Last Updated Mar 17, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink wl-wn579a3

Be the first to know when new critical vulnerabilities affecting wavlink wl-wn579a3 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / WL-WN579A3
220323

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.351070 vuldb.com: https://vuldb.com/?ctiid.351070 vuldb.com: https://vuldb.com/?submit.765327 vuldb.com: https://vuldb.com/?submit.765328 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_9/README.md github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_10/README.md dl.wavlink.com: https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin

Credits

๐Ÿ” LtzHuster (VulDB User)