CVE-2026-4544

Published: Mar 22, 2026 Last Modified: Mar 22, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,8
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: passive
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 2,4
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none
LOW 3,3
Access Vector: network
Access Complexity: low
Authentication: multiple
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
94

Improper Control of Generation of Code ('Code Injection')

Draft
Common Consequences
Security Scopes Affected:
Access Control Integrity Confidentiality Availability Non-Repudiation
Potential Impacts:
Bypass Protection Mechanism Gain Privileges Or Assume Identity Execute Unauthorized Code Or Commands Hide Activities
Applicable Platforms
Languages: Interpreted
Technologies: AI/ML
View CWE Details
https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_6/README.md
https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_7/README.md
https://vuldb.com/?ctiid.352361
https://vuldb.com/?id.352361
https://vuldb.com/?submit.774692
https://vuldb.com/?submit.774693
https://vuldb.com/?submit.774696