{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4544","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-21T15:23:59.764Z","datePublished":"2026-03-22T09:58:12.417Z","dateUpdated":"2026-03-23T16:07:56.364Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-22T09:58:12.417Z"},"title":"Wavlink WL-WN578W2 POST Request login.cgi cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"Wavlink","product":"WL-WN578W2","versions":[{"version":"221110","status":"affected"}],"cpes":["cpe:2.3:o:wavlink:wl-wn578w2_firmware:*:*:*:*:*:*:*:*"],"modules":["POST Request Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in Wavlink WL-WN578W2 221110. This affects an unknown function of the file /cgi-bin/login.cgi of the component POST Request Handler. Executing a manipulation of the argument homepage/hostname/login_page can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":2.4,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":2.4,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-21T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-21T16:29:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"LtzHuster (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.352361","name":"VDB-352361 | Wavlink WL-WN578W2 POST Request login.cgi cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.352361","name":"VDB-352361 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.774692","name":"Submit #774692 | Wavlink WL-WN578W2 V221110 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.774693","name":"Submit #774693 | Wavlink WL-WN578W2 V221110 Cross Site Scripting (Duplicate)","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.774696","name":"Submit #774696 | Wavlink WL-WN578W2 V221110 Cross Site Scripting (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_6/README.md","tags":["related"]},{"url":"https://github.com/Litengzheng/vul_db/blob/main/WL-WN578W2/vul_7/README.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T16:07:23.182321Z","id":"CVE-2026-4544","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-23T16:07:56.364Z"}}]}}