Wavlink WL-WN578W2 POST Request login.cgi cross site scripting
wird übersetzt…Plattform
other
Komponente
vul_db
Behoben in
221110.0.1
CVE-2026-4544 describes a cross-site scripting (XSS) vulnerability affecting the Wavlink WL-WN578W2 router, specifically version 221110. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users, potentially leading to session hijacking or defacement. The vulnerability resides within the /cgi-bin/login.cgi component and is triggered by manipulating the homepage/hostname/login_page argument. The vendor has not responded to early disclosure attempts.
Auswirkungen und Angriffsszenarienwird übersetzt…
Successful exploitation of CVE-2026-4544 allows an attacker to inject arbitrary JavaScript code into the web interface of the Wavlink WL-WN578W2 router. This can be leveraged to steal user cookies, redirect users to malicious websites, or even deface the router's login page. Given the router's role as a gateway to a home or small business network, a compromised router could serve as a launching point for further attacks against internal systems. The ability to execute code remotely significantly increases the potential impact, as attackers do not need physical access to the device.
Ausnutzungskontextwird übersetzt…
This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. The lack of vendor response raises concerns about the device's overall security posture. No KEV listing or EPSS score is currently available. Public proof-of-concept exploits are likely to emerge, given the ease of exploitation and public disclosure.
Wer Ist Gefährdetwird übersetzt…
Home and small business users relying on the Wavlink WL-WN578W2 router for network connectivity are at risk. Users who have not changed the default router configuration or have weak passwords are particularly vulnerable.
Angriffszeitlinie
- Disclosure
disclosure
Bedrohungsanalyse
Exploit-Status
EPSS
0.04% (11% Perzentil)
CISA SSVC
CVSS-Vektor
Was bedeuten diese Metriken?
- Attack Vector
- Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
- Attack Complexity
- Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
- Privileges Required
- Hoch — Administrator- oder Privilegienkonto erforderlich.
- User Interaction
- Erforderlich — Opfer muss eine Datei öffnen, auf einen Link klicken oder eine Seite besuchen.
- Scope
- Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
- Confidentiality
- Keine — kein Vertraulichkeitseinfluss.
- Integrity
- Niedrig — Angreifer kann einige Daten mit begrenztem Umfang ändern.
- Availability
- Keine — kein Verfügbarkeitseinfluss.
Betroffene Software
Schwachstellen-Klassifikation (CWE)
Zeitleiste
- Reserviert
- Veröffentlicht
- Geändert
- EPSS aktualisiert
Mitigation und Workaroundswird übersetzt…
Due to the vendor's lack of response, direct patching is unavailable. As a workaround, implement strict input validation on the homepage/hostname/login_page parameter within the /cgi-bin/login.cgi script, if possible. Consider using a Web Application Firewall (WAF) to filter out malicious requests containing suspicious JavaScript code. Regularly monitor router logs for unusual activity, particularly requests targeting /cgi-bin/login.cgi with unusual parameters. After implementing these mitigations, verify their effectiveness by attempting to inject a simple JavaScript payload and confirming it is blocked.
So behebenwird übersetzt…
Actualizar el firmware del dispositivo Wavlink WL-WN578W2 a una versión que corrija la vulnerabilidad de Cross-Site Scripting (XSS). Dado que el proveedor no ha respondido, se recomienda buscar actualizaciones de firmware no oficiales o considerar la sustitución del dispositivo por uno más seguro.
CVE-Sicherheitsnewsletter
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
Häufig gestellte Fragenwird übersetzt…
What is CVE-2026-4544 — XSS in Wavlink WL-WN578W2?
CVE-2026-4544 is a cross-site scripting vulnerability in the Wavlink WL-WN578W2 router version 221110, allowing attackers to inject malicious scripts via the /cgi-bin/login.cgi component.
Am I affected by CVE-2026-4544 in Wavlink WL-WN578W2?
If you are using the Wavlink WL-WN578W2 router version 221110, you are potentially affected by this vulnerability. Consider implementing workarounds until a patch is available.
How do I fix CVE-2026-4544 in Wavlink WL-WN578W2?
Unfortunately, a direct patch is unavailable. Implement workarounds like input validation, WAF rules, and log monitoring as described in the mitigation section.
Is CVE-2026-4544 being actively exploited?
The vulnerability has been publicly disclosed, increasing the risk of exploitation. Active exploitation is possible, though not yet confirmed.
Where can I find the official Wavlink advisory for CVE-2026-4544?
The vendor has not released an official advisory. Monitor security news sources for updates.
Ist dein Projekt betroffen?
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.