A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
References
| Link | Resource |
|---|---|
| https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.349221 | Permissions Required VDB Entry |
| https://vuldb.com/?id.349221 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.755341 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Mar 2026, 18:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/ipaddr_Stack%20Buffer%20Overflow.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.349221 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.349221 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.755341 - Third Party Advisory, VDB Entry | |
| First Time |
Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1 Wavlink |
|
| CPE | cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:* |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Mar 2026, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 02:15
Updated : 2026-03-10 18:30
NVD link : CVE-2026-3613
Mitre link : CVE-2026-3613
CVE.ORG link : CVE-2026-3613
JSON object : View
Products Affected
wavlink
- wl-nu516u1
- wl-nu516u1_firmware
