CVE-2026-4163 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 16, 2026
Wavlink WL-WN579A3 - Command Injection
Overview
Wavlink WL-WN579A3 220323 contains a command injection caused by manipulation in SetName/GuestWifi function in /cgi-bin/wireless.cgi POST Request Handler, letting remote attackers execute arbitrary commands, exploit requires crafted POST request.
Severity & Score
Impact
Remote attackers can execute arbitrary commands, potentially gaining full control over the device.
Mitigation
Upgrade to the latest version of the affected component.
References
- https://vuldb.com/?ctiid.351070
- https://vuldb.com/?id.351070
- https://vuldb.com/?submit.765327
- https://vuldb.com/?submit.765328
- https://dl.wavlink.com/firmware/RD/WINSTAR_WN579A3-A-2026-03-10-94f93d4-WO-mt7628-squashfs-sysupgrade.bin
- https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_10/README.md
- https://github.com/Litengzheng/vul_db/blob/main/WL-WN579A3/vul_9/README.md
Social Media Activity(1 post)
š“ CVE-2026-4163 - Critical (9.8) A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is pos... š https://www.thehackerwire.com/vulnerability/CVE-2026-4163/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-4163
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- command_injection
- Status
- unconfirmed
- EPSS
- 16.1%
- Social Posts
- 1
CWE
- CWE-74
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H