CVE-2025-10359

Wavlink · Wavlink WL-WN578W2

A high-severity vulnerability has been identified in certain Wavlink networking devices, which could allow a remote, unauthenticated attacker to execute arbitrary commands on the device.

Executive summary

A high-severity vulnerability has been identified in certain Wavlink networking devices, which could allow a remote, unauthenticated attacker to execute arbitrary commands on the device. Successful exploitation could lead to a complete compromise of the affected router, enabling the attacker to intercept network traffic, attack other devices on the internal network, or disrupt network availability. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.

Vulnerability

The vulnerability is an unauthenticated command injection flaw within the device's web management interface. An attacker can send a specially crafted HTTP request to a specific endpoint on the web server. Due to insufficient input sanitization, malicious shell commands embedded within the request's parameters are executed directly by the underlying operating system with root-level privileges, giving the attacker full control over the device without needing any prior authentication.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could have a severe impact on business operations and data security. A successful attacker could gain complete control of the network device, leading to potential consequences such as eavesdropping on sensitive network traffic (data exfiltration), redirecting users to malicious websites (phishing), disrupting network services (denial of service), or using the compromised device as a pivot point to launch further attacks against the internal corporate network. The integrity, confidentiality, and availability of the network segment managed by the device are all at high risk.

Remediation

Immediate Action: Identify all vulnerable Wavlink devices on the network and apply the vendor-supplied security updates or firmware patches immediately. After patching, verify that the update was successful and the device is running the new, secure version.

Proactive Monitoring: Monitor network traffic for anomalous outbound connections originating from the affected devices. Review firewall and web server logs for suspicious or malformed HTTP requests directed at the device's management interface. System administrators should also monitor for any unauthorized configuration changes, unexpected reboots, or high CPU usage on the devices, as these could be indicators of compromise.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Disable remote (WAN-side) access to the device's web management interface.
  • Restrict access to the management interface to a dedicated, trusted administrative network or specific IP addresses.
  • Use a network firewall or Intrusion Prevention System (IPS) to block access to the vulnerable web endpoints from untrusted sources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 7.3) and the potential for a complete network device takeover without authentication, this vulnerability poses a significant and immediate threat. We strongly recommend that organizations prioritize the identification and patching of all affected Wavlink devices. Although this CVE is not currently listed on the CISA KEV list, its characteristics make it a prime candidate for future inclusion should widespread exploitation occur. Immediate remediation is the most effective strategy to prevent potential compromise.