CVE-2026-6559
Wavlink WL-WN579A3 login.cgi sub_401F80 cross site scripting
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting. Remote exploitation of the attack is possible. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
| CWE | CWE-79 CWE-94 |
| Vendor | wavlink |
| Product | wl-wn579a3 |
| Published | Apr 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for wavlink wl-wn579a3
Be the first to know when new medium vulnerabilities affecting wavlink wl-wn579a3 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Wavlink / WL-WN579A3
220323
References
vuldb.com: https://vuldb.com/vuln/358196 vuldb.com: https://vuldb.com/vuln/358196/cti vuldb.com: https://vuldb.com/submit/785303 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_16/README.md dl.wavlink.com: https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin
Credits
๐ LtzHust2 (VulDB User) VulDB CNA Team