Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 03 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Wavlink WL-WN570HA1 R70HA1 V1410_221110. Impacted is the function set_sys_cmd of the file /cgi-bin/adm.cgi. Such manipulation of the argument command leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Once again the vendors acted very professional and confirms, "that the WN570HA1 firmware version R70HA1 V1410_221110 has been removed from our website." This vulnerability only affects products that are no longer supported by the maintainer. | |
| Title | Wavlink WL-WN570HA1 adm.cgi set_sys_cmd command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-03T10:15:11.137Z
Reserved: 2026-05-02T16:33:35.460Z
Link: CVE-2026-7691
No data.
Status : Received
Published: 2026-05-03T11:16:13.263
Modified: 2026-05-03T11:16:13.263
Link: CVE-2026-7691
No data.
OpenCVE Enrichment
Updated: 2026-05-03T11:30:20Z