CVE-2025-10324 (CNNVD-202509-1795)
中文标题:
Wavlink WL-WN578W2 命令注入漏洞
英文标题:
Wavlink WL-WN578W2 firewall.cgi sub_401C5C command injection
漏洞描述
中文描述:
Wavlink WL-WN578W2是中国睿因(Wavlink)公司的一款无线中继器。 Wavlink WL-WN578W2 221110版本存在命令注入漏洞,该漏洞源于对文件firewall.cgi中函数sub_401C5C的参数pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled的错误操作,可能导致远程命令注入攻击。
英文描述:
A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects the function sub_401C5C of the file firewall.cgi. This manipulation of the argument pingFrmWANFilterEnabled/blockSynFloodEnabled/blockPortScanEnabled/remoteManagementEnabled causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Wavlink | WL-WN578W2 | 221110 | - | - |
cpe:2.3:a:wavlink:wl-wn578w2:221110:*:*:*:*:*:*:*
|
| wavlink | wl-wn578w2_firmware | m78w2_v221110 | - | - |
cpe:2.3:o:wavlink:wl-wn578w2_firmware:m78w2_v221110:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
4.0 (cna)
MEDIUMCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:W/RC:R
2.0 (cna)
HIGHAV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:W/RC:UR
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-10324 |
2025-11-11 15:23:01 | 2025-11-11 07:40:03 |
| NVD | nvd_CVE-2025-10324 |
2025-11-11 15:01:02 | 2025-11-11 07:47:54 |
| CNNVD | cnnvd_CNNVD-202509-1795 |
2025-11-11 15:12:57 | 2025-11-11 08:00:10 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 命令注入
- cnnvd_id: 未提取 -> CNNVD-202509-1795
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']