CVE-2026-3613

A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
References
Link Resource
https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.349221 Permissions Required VDB Entry
https://vuldb.com/?id.349221 Third Party Advisory VDB Entry
https://vuldb.com/?submit.755341 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

10 Mar 2026, 18:30

Type Values Removed Values Added
References () https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md - () https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.349221 - () https://vuldb.com/?ctiid.349221 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349221 - () https://vuldb.com/?id.349221 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.755341 - () https://vuldb.com/?submit.755341 - Third Party Advisory, VDB Entry
First Time Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1
Wavlink
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*

09 Mar 2026, 13:36

Type Values Removed Values Added
Summary
  • (es) Se identificó una vulnerabilidad en Wavlink WL-NU516U1 V240425. Esta vulnerabilidad afecta a la función sub_401A0C del archivo /cgi-bin/login.cgi. Dicha manipulación del argumento ipaddr conduce a un desbordamiento de búfer basado en pila. Es posible lanzar el ataque de forma remota. El exploit está disponible públicamente y podría ser utilizado. El proveedor fue contactado con antelación sobre esta divulgación.

06 Mar 2026, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 02:15

Updated : 2026-03-10 18:30


NVD link : CVE-2026-3613

Mitre link : CVE-2026-3613

CVE.ORG link : CVE-2026-3613


JSON object : View

Products Affected

wavlink

  • wl-nu516u1
  • wl-nu516u1_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow