Description
An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi.
References (1)
Core 1
Core References
Exploit, Third Party Advisory
https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3
Scores
CVSS v3
9.8
EPSS
0.0146
EPSS Percentile
81.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-77
Status
published
Products (1)
wavlink/wl-wn575a3_firmware
r75a3_v1410_220513
Published
Aug 15, 2023
Tracked Since
Feb 18, 2026