Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3703: Out-of-bounds Write in Wavlink NU516U1

0
Critical
VulnerabilityCVE-2026-3703cvecve-2026-3703
Published: Sun Mar 08 2026 (03/08/2026, 04:32:09 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: NU516U1

Description

CVE-2026-3703 is a critical out-of-bounds write vulnerability in the Wavlink NU516U1 router firmware version 251208, specifically in the /cgi-bin/login. cgi component. The flaw exists in the sub_401A10 function and can be triggered remotely by manipulating the ipaddr argument without requiring authentication or user interaction. Successful exploitation can lead to high-impact consequences on confidentiality, integrity, and availability of the device. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of active attacks. The vendor responded promptly and released a fixed firmware version. Organizations using this device should upgrade immediately to mitigate the risk. This vulnerability poses a significant threat to networks relying on Wavlink NU516U1 devices, especially in regions where these routers are widely deployed. Given the critical severity and ease of exploitation, defenders must prioritize patching and monitor network traffic for suspicious activity targeting the affected CGI endpoint.

AI-Powered Analysis

AILast updated: 03/08/2026, 05:06:59 UTC

Technical Analysis

CVE-2026-3703 is a critical security vulnerability identified in the Wavlink NU516U1 router firmware version 251208. The vulnerability is an out-of-bounds write occurring in the function sub_401A10 within the /cgi-bin/login.cgi script. The flaw is triggered by manipulating the ipaddr argument, which is processed without proper bounds checking, allowing an attacker to write data outside the intended memory buffer. This type of vulnerability can lead to arbitrary code execution, memory corruption, or device crashes. The attack vector is remote and requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 4.0 base score is 9.3, reflecting its critical nature with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, a public exploit is available, increasing the urgency for remediation. The vendor was notified early and has released a patched firmware version, emphasizing the importance of upgrading affected devices. The vulnerability affects a specific firmware version, so verifying device firmware and applying updates is essential. This flaw could be leveraged by attackers to gain control over the device, disrupt network operations, or pivot into internal networks.

Potential Impact

The impact of CVE-2026-3703 is severe for organizations using the Wavlink NU516U1 router with the vulnerable firmware. Exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary code, disrupt network availability, or intercept and manipulate network traffic. This can result in loss of confidentiality of sensitive data, integrity breaches through unauthorized configuration changes, and denial of service conditions. Since the vulnerability is remotely exploitable without authentication, attackers can target exposed devices over the internet or internal networks. Compromised routers can serve as footholds for lateral movement, launching further attacks within corporate or home networks. The availability of a public exploit increases the likelihood of exploitation attempts, potentially leading to widespread attacks if patches are not applied. Organizations relying on these devices for critical connectivity or security functions face significant operational and reputational risks. Additionally, the vulnerability could be exploited by cybercriminals or nation-state actors to conduct espionage or disrupt services.

Mitigation Recommendations

To mitigate CVE-2026-3703, organizations should immediately identify all Wavlink NU516U1 devices running firmware version 251208 or other affected versions. The primary mitigation is to upgrade the firmware to the vendor-released patched version as soon as possible. If immediate patching is not feasible, network administrators should restrict access to the router’s management interface, especially blocking external internet access to the /cgi-bin/login.cgi endpoint. Implement network segmentation to isolate vulnerable devices from critical infrastructure. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts targeting this vulnerability. Monitor network logs for unusual requests to the ipaddr parameter or abnormal behavior on the router. Disable unnecessary services and remote management features on the device to reduce the attack surface. Regularly audit firmware versions and maintain an asset inventory to quickly respond to future vulnerabilities. Engage with the vendor for ongoing support and security updates. Finally, educate users about the risks of unpatched network devices and enforce strict patch management policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T08:56:07.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ad009b2904315ca367a3f4

Added to database: 3/8/2026, 4:52:43 AM

Last enriched: 3/8/2026, 5:06:59 AM

Last updated: 3/8/2026, 7:02:23 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses