CVE-2026-4861

A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Wlz1112/WAVLINK-NU516U1-V260227/blob/main/Content-Length.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.353192 Permissions Required VDB Entry
https://vuldb.com/?id.353192 Third Party Advisory VDB Entry
https://vuldb.com/?submit.776217 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v260227:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

30 Apr 2026, 16:57

Type Values Removed Values Added
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v260227:*:*:*:*:*:*:*
First Time Wavlink wl-nu516u1 Firmware
Wavlink wl-nu516u1
Wavlink
References () https://github.com/Wlz1112/WAVLINK-NU516U1-V260227/blob/main/Content-Length.md - () https://github.com/Wlz1112/WAVLINK-NU516U1-V260227/blob/main/Content-Length.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.353192 - () https://vuldb.com/?ctiid.353192 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.353192 - () https://vuldb.com/?id.353192 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.776217 - () https://vuldb.com/?submit.776217 - Third Party Advisory, VDB Entry

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en Wavlink WL-NU516U1 260227. Esta vulnerabilidad afecta a la función ftext del archivo /cgi-bin/nas.cgi. Esta manipulación del argumento Content-Length causa desbordamiento de búfer basado en pila. El ataque puede iniciarse remotamente. El exploit se ha puesto a disposición del público y podría usarse para ataques. El proveedor fue contactado con antelación sobre esta divulgación, pero no respondió de ninguna manera.

26 Mar 2026, 09:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 09:16

Updated : 2026-04-30 16:57


NVD link : CVE-2026-4861

Mitre link : CVE-2026-4861

CVE.ORG link : CVE-2026-4861


JSON object : View

Products Affected

wavlink

  • wl-nu516u1
  • wl-nu516u1_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow