Metrics
Affected Vendors & Products
Mon, 04 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 03 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wl-wn570ha1 |
|
| Vendors & Products |
Wavlink
Wavlink wl-wn570ha1 |
Sun, 03 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Wavlink WL-WN570HA1 R70HA1 V1410_221110. Impacted is the function set_sys_cmd of the file /cgi-bin/adm.cgi. Such manipulation of the argument command leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Once again the vendors acted very professional and confirms, "that the WN570HA1 firmware version R70HA1 V1410_221110 has been removed from our website." This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | Wavlink WL-WN570HA1 adm.cgi set_sys_cmd command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-05-03T10:15:11.137Z
Updated: 2026-05-04T13:02:51.934Z
Reserved: 2026-05-02T16:33:35.460Z
Link: CVE-2026-7691
Updated: 2026-05-04T13:02:47.848Z
Status : Awaiting Analysis
Published: 2026-05-03T11:16:13.263
Modified: 2026-05-05T19:14:05.000
Link: CVE-2026-7691
No data.
ReportizFlow