CVE-2026-2567

A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the function sub_401218 of the file /cgi-bin/nas.cgi. Performing a manipulation of the argument User1Passwd results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
References
Link Resource
https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/nas.cgi_User1Passwd.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.346174 Permissions Required VDB Entry
https://vuldb.com/?id.346174 Third Party Advisory VDB Entry
https://vuldb.com/?submit.752016 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-16 18:19

Updated : 2026-02-18 19:41


NVD link : CVE-2026-2567

Mitre link : CVE-2026-2567

CVE.ORG link : CVE-2026-2567


JSON object : View

Products Affected

wavlink

  • wl-nu516u1_firmware
  • wl-nu516u1
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write