LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-4163 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 16, 2026

Wavlink WL-WN579A3 - Command Injection

Published: March 16, 2026Updated: March 16, 2026Remote Exploitable

Overview

Wavlink WL-WN579A3 220323 contains a command injection caused by manipulation in SetName/GuestWifi function in /cgi-bin/wireless.cgi POST Request Handler, letting remote attackers execute arbitrary commands, exploit requires crafted POST request.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 16.1%(Probability of exploitation in next 30 days)

Impact

Remote attackers can execute arbitrary commands, potentially gaining full control over the device.

Mitigation

Upgrade to the latest version of the affected component.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 16, 2026

šŸ”“ CVE-2026-4163 - Critical (9.8) A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is pos... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-4163/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-4163
Severity
Critical
CVSS Score
9.8
Type
command_injection
Status
unconfirmed
EPSS
16.1%
Social Posts
1

CWE

  • CWE-74

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

16.1%Probability of exploitation in the next 30 days