CVE-2026-3703

A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:251208:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

10 Mar 2026, 18:55

Type Values Removed Values Added
References () https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin - () https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin - Broken Link
References () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md - () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md - Exploit, Vendor Advisory
References () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md#exp-exploit--poc - () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md#exp-exploit--poc - Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.349649 - () https://vuldb.com/?ctiid.349649 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349649 - () https://vuldb.com/?id.349649 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.759226 - () https://vuldb.com/?submit.759226 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha encontrado una vulnerabilidad en Wavlink NU516U1 251208. Esto afecta a la función sub_401A10 del archivo /cgi-bin/login.cgi. La ejecución de una manipulación del argumento ipaddr puede conducir a una escritura fuera de límites. El ataque puede realizarse de forma remota. El exploit ha sido publicado y puede ser utilizado. Se recomienda actualizar el componente afectado. Se contactó al proveedor con antelación, respondió de manera muy profesional y rápidamente lanzó una versión corregida del producto afectado.
First Time Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1
Wavlink
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:251208:*:*:*:*:*:*:*

08 Mar 2026, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-08 05:16

Updated : 2026-03-10 18:55


NVD link : CVE-2026-3703

Mitre link : CVE-2026-3703

CVE.ORG link : CVE-2026-3703


JSON object : View

Products Affected

wavlink

  • wl-nu516u1
  • wl-nu516u1_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-787

Out-of-bounds Write