Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2566: Stack-based Buffer Overflow in Wavlink WL-NU516U1

0
High
VulnerabilityCVE-2026-2566cvecve-2026-2566
Published: Mon Feb 16 2026 (02/16/2026, 17:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-NU516U1

Description

CVE-2026-2566 is a high-severity stack-based buffer overflow vulnerability in the Wavlink WL-NU516U1 router firmware versions up to 130 and 260. The flaw exists in the /cgi-bin/adm. cgi component, specifically in the sub_406194 function, where improper handling of the firmware_url argument allows an attacker to overflow the stack. This vulnerability can be exploited remotely without user interaction or authentication, potentially leading to full compromise of the device. Although the vendor was notified, no patch or response has been provided. The CVSS 4. 0 score is 8. 6, reflecting the high impact on confidentiality, integrity, and availability. European organizations using this router model are at risk, especially in sectors relying on Wavlink networking equipment. Mitigation requires network segmentation, disabling remote management, and monitoring for suspicious traffic, as no official patch is currently available.

AI-Powered Analysis

AILast updated: 02/16/2026, 17:43:48 UTC

Technical Analysis

CVE-2026-2566 identifies a stack-based buffer overflow vulnerability in the Wavlink WL-NU516U1 router firmware versions up to 130 and 260. The vulnerability resides in the /cgi-bin/adm.cgi CGI script, specifically within the sub_406194 function, which processes the firmware_url parameter. Improper validation or bounds checking of this parameter allows an attacker to overwrite the stack memory, leading to potential arbitrary code execution. The flaw can be exploited remotely over the network without requiring authentication or user interaction, making it highly dangerous. The vendor was contacted early but has not issued any patches or advisories, increasing the risk of exploitation. The vulnerability has a CVSS 4.0 score of 8.6, indicating high severity due to its remote exploitability, lack of required privileges, and significant impact on confidentiality, integrity, and availability. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the likelihood of active attacks. The affected device is commonly used in small to medium enterprise and home network environments, which may expose European organizations to risks of network compromise, data interception, or denial of service.

Potential Impact

For European organizations, exploitation of CVE-2026-2566 could lead to full compromise of affected Wavlink WL-NU516U1 routers, enabling attackers to execute arbitrary code with high privileges. This can result in interception or manipulation of network traffic, unauthorized access to internal systems, disruption of network availability, and potential lateral movement within corporate networks. Critical sectors such as finance, healthcare, and government agencies relying on these devices for network connectivity could face significant operational and data security risks. The lack of vendor response and patch availability exacerbates the threat, increasing exposure time. Additionally, the remote and unauthenticated nature of the exploit lowers the barrier for attackers, including cybercriminals and state-sponsored actors targeting European infrastructure. The overall impact includes potential data breaches, service outages, and erosion of trust in network security.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, disable remote management interfaces on the Wavlink WL-NU516U1 devices to prevent external exploitation. Network segmentation should be enforced to isolate vulnerable routers from critical internal systems. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous requests to /cgi-bin/adm.cgi or unusual firmware_url parameter usage. Regularly monitor network traffic for signs of exploitation attempts, including unexpected HTTP requests or buffer overflow indicators. Where possible, replace affected devices with alternative routers from vendors with active security support. Additionally, enforce strict access controls and maintain up-to-date network device inventories to quickly identify and remediate vulnerable hardware. Organizations should also engage with Wavlink for updates and monitor vulnerability databases for any forthcoming patches or advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T19:40:06.995Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699353fad1735ca7319d6c0a

Added to database: 2/16/2026, 5:29:30 PM

Last enriched: 2/16/2026, 5:43:48 PM

Last updated: 2/16/2026, 8:02:01 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats