CVE-2026-4163
Published: 16 March 2026
Description
A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The…
more
exploit is now public and may be used. Upgrading the affected component is recommended.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely identification, reporting, and patching of the command injection flaw in the Wavlink firmware.
Prevents command injection exploitation by enforcing validation of untrusted inputs to the vulnerable SetName/GuestWifi POST handler in wireless.cgi.
Protects the remotely accessible, publicly exposed web management interface hosting the vulnerable CGI endpoint from unauthorized access.
Security SummaryAI
CVE-2026-4163 is a command injection vulnerability (CWE-74, CWE-77) in the Wavlink WL-WN579A3 firmware version 220323. The issue resides in the SetName/GuestWifi function within the /cgi-bin/wireless.cgi file's POST Request Handler component. Manipulation of requests to this endpoint allows attackers to inject and execute arbitrary commands on the device.
The vulnerability has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating it is exploitable remotely by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation enables full compromise of the device, including high confidentiality, integrity, and availability impacts through arbitrary command execution.
Advisories recommend upgrading the affected component to mitigate the issue, with a patched firmware image available at https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin. Additional details and likely proof-of-concept exploits are documented in GitHub repositories (https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_10/README.md, https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_9/README.md) and VulDB entries (https://vuldb.com/?ctiid.351070, https://vuldb.com/?id.351070).
The exploit is public, increasing the risk of widespread abuse against exposed Wavlink WL-WN579A3 devices.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated command injection via public-facing router web interface (T1190: Exploit Public-Facing Application) enables arbitrary Unix shell command execution (T1059.004: Unix Shell) on the Linux-based router.