Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
7.4

Wavlink Router Firewall Has Remote Code Execution Flaw

CVE-2026-3715
Summary

A flaw in Wavlink's WL-WN579X3-C 231124 router's firewall allows an attacker to potentially take control of the device remotely. This can happen if an attacker exploits a weakness in the device's software. To fix this, update to the latest version (20260226) of the router's software.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
wavlink wl-wn579x3-c_firmware 231124 –
Original title
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack...
Original description
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
nvd CVSS2.0 9.0
nvd CVSS3.1 8.8
nvd CVSS4.0 7.4
Vulnerability type
CWE-119 Buffer Overflow
CWE-121 Stack-based Buffer Overflow
Published: 8 Mar 2026 · Updated: 13 Mar 2026 · First seen: 8 Mar 2026