A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
References
| Link | Resource |
|---|---|
| https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin | Broken Link |
| https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md | Exploit Vendor Advisory |
| https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md#exp-exploit--poc | Exploit Vendor Advisory |
| https://vuldb.com/?ctiid.349649 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349649 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.759226 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-08 05:16
Updated : 2026-03-10 18:55
NVD link : CVE-2026-3703
Mitre link : CVE-2026-3703
CVE.ORG link : CVE-2026-3703
JSON object : View
Products Affected
wavlink
- wl-nu516u1_firmware
- wl-nu516u1
