CVE-2025-10321

5.3 MEDIUM

📋 TL;DR

This vulnerability in Wavlink WL-WN578W2 routers allows remote attackers to access sensitive information through the /live_online.shtml file. The flaw enables information disclosure without authentication, affecting users of this specific router model. Attackers can exploit this remotely to potentially gather system or network data.

💻 Affected Systems

Products:
  • Wavlink WL-WN578W2
Versions: 221110
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects this specific model and firmware version. Devices with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive router configuration data, network topology information, or credentials that could lead to further network compromise.

🟠

Likely Case

Unauthorized access to system information or configuration details that could aid in reconnaissance for additional attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. Remote exploitation requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider replacing affected devices or implementing workarounds.

🔧 Temporary Workarounds

Block External Access

all

Prevent external access to router administration interface

Configure firewall to block WAN access to router management ports (typically 80, 443, 8080)

Disable Vulnerable Feature

all

Disable or restrict access to the live_online.shtml functionality if possible

Check router settings for live monitoring features and disable them

🧯 If You Can't Patch

  • Segment affected routers on isolated network segments
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Access http://[router-ip]/live_online.shtml from network. If accessible without authentication and returns sensitive information, device is vulnerable.

Check Version:

Check router web interface or use command: telnet [router-ip] 80, then GET / HTTP/1.0 to view version headers

Verify Fix Applied:

Attempt to access the vulnerable endpoint after implementing workarounds. Should return access denied or not found.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /live_online.shtml from unauthorized sources
  • Unusual access patterns to router management interface

Network Indicators:

  • External IP addresses accessing router management ports
  • Traffic to /live_online.shtml from unexpected sources

SIEM Query:

source_ip NOT IN (trusted_networks) AND (url_path CONTAINS 'live_online.shtml' OR dest_port IN (80, 443, 8080))

🔗 References

📤 Share & Export