CVE-2026-3613

A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
References
Link Resource
https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.349221 Permissions Required VDB Entry
https://vuldb.com/?id.349221 Third Party Advisory VDB Entry
https://vuldb.com/?submit.755341 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-06 02:15

Updated : 2026-03-10 18:30


NVD link : CVE-2026-3613

Mitre link : CVE-2026-3613

CVE.ORG link : CVE-2026-3613


JSON object : View

Products Affected

wavlink

  • wl-nu516u1_firmware
  • wl-nu516u1
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow