← Volver a CVEs
CVE-2025-10324
HIGH7.3
Descripcion
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Detalles CVE
Puntuacion CVSS v3.17.3
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado9/12/2025
Ultima modificacion10/2/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
wavlink:wl-wn578w2wavlink:wl-wn578w2_firmware
Debilidades (CWE)
CWE-74CWE-77CWE-77
Referencias
https://github.com/ZZ2266/.github.io/tree/main/WAVLINK/WL-WN578W2/firewall.cgi/websSysFirewall(cna@vuldb.com)
https://vuldb.com/?ctiid.323750(cna@vuldb.com)
https://vuldb.com/?id.323750(cna@vuldb.com)
https://vuldb.com/?submit.643435(cna@vuldb.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.