Critical Vulnerability Information Vulnerability Overview Vulnerability Type: Unauthenticated Command Injection Affected Device: WAVLINK WL-WN578W2 M78W2_V221110 Affected File: CVE ID: Pending Vulnerability Details Vendor: WAVLINK Product: WAVLINK WL-WN578W2 (Wireless Range Extender) Firmware Version: M78W2_V221110 Firmware Download Link: Firmware Download Affected Endpoint: (POST method, no authentication required) Trigger Condition: Request parameter Vulnerable Parameter: Description 1. Invalid Authentication Check: The authentication logic in ( ) is ineffective, allowing unauthenticated requests to be processed. 2. Action Routing: When the parameter is present, the function is invoked to handle the request. 3. Unfiltered Injection: The parameter is extracted and directly concatenated into a command string without filtering delimiters (e.g., ), enabling unauthenticated attackers to inject arbitrary commands. Proof of Concept (PoC) 1. Start Netcat Listener: 2. Send Unauthenticated POST Request: 3. Verify Execution: Confirm successful command injection by receiving a response from the device via the Netcat listener.