Vulnerability Description
A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting. Remote exploitation of the attack is possible. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt762
- https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_16/README.md
- https://vuldb.com/submit/785303
- https://vuldb.com/vuln/358196
- https://vuldb.com/vuln/358196/cti
FAQ
What is CVE-2026-6559?
CVE-2026-6559 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting...
How severe is CVE-2026-6559?
CVE-2026-6559 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6559?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.