A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure. | |
| Title | Wavlink WL-NU516U1 login.cgi sub_401A0C stack-based overflow | |
| First Time appeared |
Wavlink
Wavlink wl-nu516u1 Firmware |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wavlink
Wavlink wl-nu516u1 Firmware |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-03-06T01:02:07.731Z
Updated: 2026-03-06T01:02:07.731Z
Reserved: 2026-03-05T18:20:51.728Z
Link: CVE-2026-3613
No data.
Status : Received
Published: 2026-03-06T02:15:51.793
Modified: 2026-03-06T02:15:51.793
Link: CVE-2026-3613
No data.