A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
References
| Link | Resource |
|---|---|
| https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.349221 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349221 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.755341 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-06 02:15
Updated : 2026-03-10 18:30
NVD link : CVE-2026-3613
Mitre link : CVE-2026-3613
CVE.ORG link : CVE-2026-3613
JSON object : View
Products Affected
wavlink
- wl-nu516u1_firmware
- wl-nu516u1
