CVE-2026-3704

A vulnerability has been found in Wavlink NU516U1 251208. This vulnerability affects the function sub_405B2C of the file /cgi-bin/firewall.cgi of the component Incomplete Fix CVE-2025-10959. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:251208:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

10 Mar 2026, 18:55

Type Values Removed Values Added
First Time Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1
Wavlink
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:251208:*:*:*:*:*:*:*
References () https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin - () https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin - Broken Link
References () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/wavlink_DMZ.md - () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/wavlink_DMZ.md - Exploit, Third Party Advisory
References () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/wavlink_DMZ.md#exp - () https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/wavlink_DMZ.md#exp - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.349650 - () https://vuldb.com/?ctiid.349650 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349650 - () https://vuldb.com/?id.349650 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.759233 - () https://vuldb.com/?submit.759233 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad ha sido encontrada en Wavlink NU516U1 251208. Esta vulnerabilidad afecta la función sub_405B2C del archivo /cgi-bin/firewall.cgi del componente Incomplete Fix CVE-2025-10959. La manipulación conduce a inyección de comandos. Es posible iniciar el ataque remotamente. El exploit ha sido divulgado al público y puede ser usado. Se recomienda actualizar el componente afectado. El proveedor fue contactado tempranamente, respondió de una manera muy profesional y rápidamente lanzó una versión corregida del producto afectado.

08 Mar 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-08 04:15

Updated : 2026-03-10 18:55


NVD link : CVE-2026-3704

Mitre link : CVE-2026-3704

CVE.ORG link : CVE-2026-3704


JSON object : View

Products Affected

wavlink

  • wl-nu516u1
  • wl-nu516u1_firmware
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')