Command Injection Vulnerability in Wavlink WL-WN570HA1 Router
CVE-2026-7692
Key Information:
- Vendor
Wavlink
- Status
- Vendor
- CVE Published:
- 3 May 2026
Badges
What is CVE-2026-7692?
A command injection vulnerability exists in the Wavlink WL-WN570HA1 router, specifically within the ping_ddns function located in the /cgi-bin/adm.cgi file. An attacker can exploit this vulnerability by manipulating the DDNS argument, allowing remote code execution. The issue affects firmware version R70HA1 V1410_221110 and has been confirmed by the vendor, which has removed the affected firmware from its website. This vulnerability poses a risk to products that are no longer supported.
Affected Version(s)
WL-WN570HA1 R70HA1 V1410_221110
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
