Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Wavlink Router Allows Remote Attackers to Overwrite Memory
CVE-2026-2567
Summary
A security issue has been found in the Wavlink WL-NU516U1 router. Attackers can potentially take control of the device by sending a specially crafted request to the router, which could let them access or modify sensitive data. Update your router's software to prevent this vulnerability.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wavlink | wl-nu516u1_firmware | <= 2025-12-08 | – |
Original title
A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the function sub_401218 of the file /cgi-bin/nas.cgi. Performing a manipulation of the argument User1Passwd r...
Original description
A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the function sub_401218 of the file /cgi-bin/nas.cgi. Performing a manipulation of the argument User1Passwd results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.
nvd CVSS2.0
8.3
nvd CVSS3.1
7.2
nvd CVSS4.0
7.3
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
CWE-787
Out-of-bounds Write
- https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/nas.cgi_User1Passw... Exploit Third Party Advisory
- https://vuldb.com/?ctiid.346174 Permissions Required VDB Entry
- https://vuldb.com/?id.346174 Third Party Advisory VDB Entry
- https://vuldb.com/?submit.752016 Third Party Advisory VDB Entry
Published: 16 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026