Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.3
Wavlink WL-NU516U1: Remote Attack Possible Through Login Page
CVE-2026-3613
Summary
A flaw in the Wavlink WL-NU516U1's login page makes it possible for hackers to potentially take control of the device remotely. This could allow them to access sensitive information or make changes to the device. We recommend updating the device to the latest firmware to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wavlink | wl-nu516u1_firmware | m16u1_v240425 | – |
Original title
A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to st...
Original description
A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
nvd CVSS2.0
8.3
nvd CVSS3.1
7.2
nvd CVSS4.0
7.3
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
Published: 6 Mar 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026