Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3704: Command Injection in Wavlink NU516U1

0
Medium
VulnerabilityCVE-2026-3704cvecve-2026-3704
Published: Sun Mar 08 2026 (03/08/2026, 03:28:16 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: NU516U1

Description

CVE-2026-3704 is a command injection vulnerability found in the Wavlink NU516U1 router firmware version 251208. The flaw exists in the /cgi-bin/firewall. cgi component, specifically in the sub_405B2C function, as a result of an incomplete fix for a previous vulnerability (CVE-2025-10959). This vulnerability allows unauthenticated remote attackers with high privileges to execute arbitrary commands on the device. Although the CVSS score is medium (5. 1), the vulnerability can lead to partial confidentiality, integrity, and availability impacts. The vendor responded promptly and released a patch to fix the issue. No known exploits are currently observed in the wild. Organizations using this specific Wavlink model and firmware version should upgrade immediately to mitigate risk.

AI-Powered Analysis

AILast updated: 03/08/2026, 04:21:59 UTC

Technical Analysis

CVE-2026-3704 is a command injection vulnerability affecting the Wavlink NU516U1 router, firmware version 251208. The vulnerability resides in the sub_405B2C function within the /cgi-bin/firewall.cgi CGI script, which handles firewall configuration. This flaw is a consequence of an incomplete remediation of a previous vulnerability (CVE-2025-10959), indicating that the patch did not fully address the root cause. Attackers can remotely exploit this vulnerability without user interaction or authentication, leveraging the command injection to execute arbitrary system commands with elevated privileges. The vulnerability's CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H, which suggests high privileges but the description states remote initiation, so possibly a discrepancy), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified early and responded professionally by releasing a fixed firmware version. While no public exploits are currently known, the public disclosure increases the risk of exploitation. The vulnerability affects only the specific firmware version 251208 of the NU516U1 model, limiting the scope but still posing a risk to users of this device. The vulnerability allows attackers to manipulate firewall.cgi parameters to inject commands, potentially leading to unauthorized control over the device, data leakage, or disruption of network services.

Potential Impact

The primary impact of CVE-2026-3704 is unauthorized remote command execution on affected Wavlink NU516U1 devices, which can compromise device integrity and availability. Attackers could manipulate firewall settings, disrupt network traffic, or use the device as a foothold for further attacks within an organization's network. Confidentiality could be partially impacted if attackers access sensitive configuration data or intercept traffic. Although the CVSS score is medium, the ability to execute commands remotely without user interaction increases the risk. Organizations relying on this router model for network perimeter security or internal segmentation may face increased exposure to lateral movement or persistent compromise. The vulnerability could also be leveraged in botnet formation or as part of larger multi-stage attacks. Given the limited affected firmware version, the overall global impact is contained but significant for users of this specific device and firmware.

Mitigation Recommendations

Organizations should immediately verify if they are using Wavlink NU516U1 devices running firmware version 251208 and upgrade to the latest patched firmware released by Wavlink. Network administrators should restrict access to the router's management interfaces, especially the /cgi-bin/firewall.cgi endpoint, by limiting it to trusted IP addresses or internal networks. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Monitor network traffic for unusual activity or command injection attempts targeting the firewall CGI scripts. Implement strict firewall rules to block unauthorized remote access to router management interfaces. Regularly audit and update device firmware to ensure all security patches are applied promptly. If upgrading firmware is not immediately possible, consider disabling remote management features or restricting them via VPN or secure channels. Finally, maintain an inventory of network devices and their firmware versions to quickly identify and remediate vulnerable assets.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T08:56:16.000Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69acf60f2904315ca36302db

Added to database: 3/8/2026, 4:07:43 AM

Last enriched: 3/8/2026, 4:21:59 AM

Last updated: 3/8/2026, 5:16:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses