Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3612: Command Injection in Wavlink WL-NU516U1

0
High
VulnerabilityCVE-2026-3612cvecve-2026-3612
Published: Fri Mar 06 2026 (03/06/2026, 00:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: WL-NU516U1

Description

CVE-2026-3612 is a high-severity command injection vulnerability found in the Wavlink WL-NU516U1 router, specifically in the OTA Online Upgrade component's adm. cgi script. The vulnerability arises from improper handling of the firmware_url argument in the sub_405AF4 function, allowing remote attackers to execute arbitrary commands without user interaction or authentication. Although no public exploits are currently observed in the wild, the exploit code has been disclosed publicly, increasing the risk of exploitation. This vulnerability affects version V240425 of the product and has a CVSS 4. 0 base score of 8. 6, indicating a significant threat to confidentiality, integrity, and availability. Organizations using this device should prioritize patching or mitigating this issue to prevent potential remote compromise. The affected device is commonly used in various countries, especially where Wavlink products have market penetration. Immediate mitigation steps include disabling OTA updates, restricting access to the adm.

AI-Powered Analysis

AILast updated: 03/06/2026, 01:15:22 UTC

Technical Analysis

CVE-2026-3612 is a command injection vulnerability identified in the Wavlink WL-NU516U1 router, version V240425. The flaw exists in the OTA Online Upgrade functionality, specifically within the sub_405AF4 function of the /cgi-bin/adm.cgi script. The vulnerability is triggered by manipulating the firmware_url parameter, which is not properly sanitized, allowing an attacker to inject and execute arbitrary system commands remotely. This attack vector requires no user interaction and no authentication, making it highly exploitable over the network. The vulnerability impacts the confidentiality, integrity, and availability of the device, as an attacker could execute commands to control the router, intercept or modify traffic, or disrupt network services. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H but likely a typo or misconfiguration since no authentication is needed), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been observed in the wild yet, the public disclosure of exploit details increases the risk of imminent exploitation. The vendor was notified early, but no patch links are currently available, indicating that mitigation relies on workarounds or vendor updates. This vulnerability highlights the risks of insecure firmware update mechanisms in IoT and networking devices.

Potential Impact

The impact of CVE-2026-3612 is severe for organizations using the Wavlink WL-NU516U1 router, as successful exploitation allows remote attackers to execute arbitrary commands on the device without authentication or user interaction. This can lead to full device compromise, enabling attackers to intercept or manipulate network traffic, deploy malware, pivot into internal networks, or cause denial of service by disrupting router functionality. The compromise of network infrastructure devices like routers can have cascading effects, potentially exposing sensitive data, disrupting business operations, and undermining trust in network security. Given the router's role in both enterprise and consumer environments, the vulnerability poses risks to small businesses, home offices, and larger organizations relying on these devices for connectivity. The public availability of exploit code increases the likelihood of attacks, especially from opportunistic threat actors and automated scanning tools. The absence of an official patch at the time of disclosure further elevates risk, necessitating immediate mitigation to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2026-3612, organizations should: 1) Immediately restrict access to the /cgi-bin/adm.cgi interface by implementing network segmentation and firewall rules to limit access only to trusted management hosts. 2) Disable the OTA Online Upgrade feature if possible, or configure it to only accept firmware updates from trusted, verified sources. 3) Monitor network traffic for unusual requests targeting the firmware_url parameter or the adm.cgi endpoint, using intrusion detection/prevention systems with updated signatures. 4) Apply any vendor-provided patches or firmware updates as soon as they become available. 5) If patching is delayed, consider deploying compensating controls such as web application firewalls (WAFs) to detect and block command injection attempts. 6) Conduct regular security assessments of network devices to identify similar vulnerabilities and ensure secure configuration. 7) Educate network administrators about the risks of exposing management interfaces to untrusted networks and enforce strong access controls. These steps go beyond generic advice by focusing on limiting attack surface, monitoring for exploitation attempts, and preparing for patch deployment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-05T18:20:48.894Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa274ec48b3f10ffabbad2

Added to database: 3/6/2026, 1:01:02 AM

Last enriched: 3/6/2026, 1:15:22 AM

Last updated: 3/6/2026, 3:14:44 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses