CVE-2026-4163
Wavlink WL-WN579A3 POST Request wireless.cgi GuestWifi command injection
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.
| CWE | CWE-77 CWE-74 |
| Vendor | wavlink |
| Product | wl-wn579a3 |
| Published | Mar 14, 2026 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for wavlink wl-wn579a3
Be the first to know when new critical vulnerabilities affecting wavlink wl-wn579a3 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Wavlink / WL-WN579A3
220323
References
vuldb.com: https://vuldb.com/?id.351070 vuldb.com: https://vuldb.com/?ctiid.351070 vuldb.com: https://vuldb.com/?submit.765327 vuldb.com: https://vuldb.com/?submit.765328 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_9/README.md github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_10/README.md dl.wavlink.com: https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin
Credits
๐ LtzHuster (VulDB User)