### [CVE-2023-38861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38861) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue in Wavlink WL_WNJ575A3 v.R75A3_V1410_220513 allows a remote attacker to execute arbitrary code via username parameter of the set_sys_adm function in adm.cgi. ### POC #### Reference - https://github.com/TTY-flag/my_iot_vul/tree/main/WAVLINK/WL-WN575A3 #### Github No PoCs found on GitHub currently.