Vulnerability Description
A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wavlink | Wl-Wn578W2 Firmware | m78w2_v221110 |
| Wavlink | Wl-Wn578W2 | - |
Related Weaknesses (CWE)
References
- https://github.com/ZZ2266/.github.io/blob/main/WAVLINK/WL-WN578W2/login.cgi/logiExploitThird Party Advisory
- https://vuldb.com/?ctiid.323751Permissions RequiredVDB Entry
- https://vuldb.com/?id.323751Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.643436Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.643437Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-10325?
CVE-2025-10325 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was identified in Wavlink WL-WN578W2 221110. This impacts the function sub_401340/sub_401BA4 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to command i...
How severe is CVE-2025-10325?
CVE-2025-10325 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-10325?
Check the references section above for vendor advisories and patch information. Affected products include: Wavlink Wl-Wn578W2 Firmware, Wavlink Wl-Wn578W2.