VYPR
Medium severity4.3NVD Advisory· Published Apr 19, 2026· Updated Apr 22, 2026

CVE-2026-6559

CVE-2026-6559

Description

A weakness has been identified in Wavlink WL-WN579A3 220323. This affects the function sub_401F80 of the file /cgi-bin/login.cgi. This manipulation of the argument Hostname causes cross site scripting. Remote exploitation of the attack is possible. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A cross-site scripting vulnerability in Wavlink WL-WN579A3 router's login.cgi allows remote attackers to execute arbitrary JavaScript via crafted Hostname parameter.

The vulnerability is a reflected cross-site scripting (XSS) issue in the Wavlink WL-WN579A3 router firmware version 220323. The flaw resides in the file /cgi-bin/login.cgi, specifically in the function sub_401F80. The Hostname parameter from a POST request is directly concatenated into the response without proper sanitization, allowing an attacker to inject arbitrary HTML or JavaScript [1].

Exploitation requires sending a crafted POST request to /cgi-bin/login.cgi with a malicious Hostname value. For example, setting Hostname to 192.168.6.2"<svg/onload=alert()> triggers the XSS. The attack is remote and does not require authentication, as the login.cgi endpoint is accessible to unauthenticated users [1].

Successful exploitation enables an attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, or further attacks against the router's web interface. The XSS is triggered when the response is rendered, and the injected script runs with the privileges of the logged-in user [1].

The vendor was contacted and released a fixed firmware version. Users are strongly advised to upgrade to the latest firmware available from Wavlink's official website to mitigate this vulnerability [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.