A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the function sub_401218 of the file /cgi-bin/nas.cgi. Performing a manipulation of the argument User1Passwd results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/nas.cgi_User1Passwd.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.346174 | Permissions Required VDB Entry |
| https://vuldb.com/?id.346174 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.752016 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
18 Feb 2026, 19:41
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/nas.cgi_User1Passwd.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.346174 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.346174 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.752016 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:* |
|
| First Time |
Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1 Wavlink |
|
| CWE | CWE-787 |
18 Feb 2026, 17:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Feb 2026, 18:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-16 18:19
Updated : 2026-02-18 19:41
NVD link : CVE-2026-2567
Mitre link : CVE-2026-2567
CVE.ORG link : CVE-2026-2567
JSON object : View
Products Affected
wavlink
- wl-nu516u1
- wl-nu516u1_firmware
