No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 22 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Wavlink WL-WN578W2 POST Request login.cgi cross site scripting | |
| First Time appeared |
Wavlink
Wavlink wl-wn578w2 Firmware |
|
| Weaknesses | CWE-79 CWE-94 |
|
| CPEs | cpe:2.3:o:wavlink:wl-wn578w2_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wavlink
Wavlink wl-wn578w2 Firmware |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-22T09:58:12.417Z
Reserved: 2026-03-21T15:23:59.764Z
Link: CVE-2026-4544
No data.
Status : Received
Published: 2026-03-22T10:16:07.560
Modified: 2026-03-22T10:16:07.560
Link: CVE-2026-4544
No data.
OpenCVE Enrichment
No data.