Command Injection Vulnerability in Wavlink WL-WN579A3 Wireless Router
CVE-2026-2528
Key Information:
- Vendor
Wavlink
- Status
- Vendor
- CVE Published:
- 16 February 2026
Badges
What is CVE-2026-2528?
A command injection vulnerability exists in the Wavlink WL-WN579A3 wireless router affecting the Delete_Mac_list function within the /cgi-bin/wireless.cgi script. The flaw allows an attacker to manipulate the argument delete_list, potentially leading to unauthorized command execution on the device. As the exploit is readily available, it poses a significant risk for remote exploitation, emphasizing the importance of prompt attention to security updates. Despite prior notification to the vendor, there has been no response regarding the matter.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
WL-WN579A3 20210219
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
