CVE-2026-3704: Command Injection in Wavlink NU516U1
CVE-2026-3704 is a command injection vulnerability found in the Wavlink NU516U1 router firmware version 251208. The flaw exists in the /cgi-bin/firewall. cgi component, specifically in the sub_405B2C function, as a result of an incomplete fix for a previous vulnerability (CVE-2025-10959). This vulnerability allows unauthenticated remote attackers with high privileges to execute arbitrary commands on the device. Although the CVSS score is medium (5. 1), the vulnerability can lead to partial confidentiality, integrity, and availability impacts. The vendor responded promptly and released a patch to fix the issue. No known exploits are currently observed in the wild. Organizations using this specific Wavlink model and firmware version should upgrade immediately to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-3704 is a command injection vulnerability affecting the Wavlink NU516U1 router, firmware version 251208. The vulnerability resides in the sub_405B2C function within the /cgi-bin/firewall.cgi CGI script, which handles firewall configuration. This flaw is a consequence of an incomplete remediation of a previous vulnerability (CVE-2025-10959), indicating that the patch did not fully address the root cause. Attackers can remotely exploit this vulnerability without user interaction or authentication, leveraging the command injection to execute arbitrary system commands with elevated privileges. The vulnerability's CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H, which suggests high privileges but the description states remote initiation, so possibly a discrepancy), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified early and responded professionally by releasing a fixed firmware version. While no public exploits are currently known, the public disclosure increases the risk of exploitation. The vulnerability affects only the specific firmware version 251208 of the NU516U1 model, limiting the scope but still posing a risk to users of this device. The vulnerability allows attackers to manipulate firewall.cgi parameters to inject commands, potentially leading to unauthorized control over the device, data leakage, or disruption of network services.
Potential Impact
The primary impact of CVE-2026-3704 is unauthorized remote command execution on affected Wavlink NU516U1 devices, which can compromise device integrity and availability. Attackers could manipulate firewall settings, disrupt network traffic, or use the device as a foothold for further attacks within an organization's network. Confidentiality could be partially impacted if attackers access sensitive configuration data or intercept traffic. Although the CVSS score is medium, the ability to execute commands remotely without user interaction increases the risk. Organizations relying on this router model for network perimeter security or internal segmentation may face increased exposure to lateral movement or persistent compromise. The vulnerability could also be leveraged in botnet formation or as part of larger multi-stage attacks. Given the limited affected firmware version, the overall global impact is contained but significant for users of this specific device and firmware.
Mitigation Recommendations
Organizations should immediately verify if they are using Wavlink NU516U1 devices running firmware version 251208 and upgrade to the latest patched firmware released by Wavlink. Network administrators should restrict access to the router's management interfaces, especially the /cgi-bin/firewall.cgi endpoint, by limiting it to trusted IP addresses or internal networks. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Monitor network traffic for unusual activity or command injection attempts targeting the firewall CGI scripts. Implement strict firewall rules to block unauthorized remote access to router management interfaces. Regularly audit and update device firmware to ensure all security patches are applied promptly. If upgrading firmware is not immediately possible, consider disabling remote management features or restricting them via VPN or secure channels. Finally, maintain an inventory of network devices and their firmware versions to quickly identify and remediate vulnerable assets.
Affected Countries
United States, China, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, Brazil
CVE-2026-3704: Command Injection in Wavlink NU516U1
Description
CVE-2026-3704 is a command injection vulnerability found in the Wavlink NU516U1 router firmware version 251208. The flaw exists in the /cgi-bin/firewall. cgi component, specifically in the sub_405B2C function, as a result of an incomplete fix for a previous vulnerability (CVE-2025-10959). This vulnerability allows unauthenticated remote attackers with high privileges to execute arbitrary commands on the device. Although the CVSS score is medium (5. 1), the vulnerability can lead to partial confidentiality, integrity, and availability impacts. The vendor responded promptly and released a patch to fix the issue. No known exploits are currently observed in the wild. Organizations using this specific Wavlink model and firmware version should upgrade immediately to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-3704 is a command injection vulnerability affecting the Wavlink NU516U1 router, firmware version 251208. The vulnerability resides in the sub_405B2C function within the /cgi-bin/firewall.cgi CGI script, which handles firewall configuration. This flaw is a consequence of an incomplete remediation of a previous vulnerability (CVE-2025-10959), indicating that the patch did not fully address the root cause. Attackers can remotely exploit this vulnerability without user interaction or authentication, leveraging the command injection to execute arbitrary system commands with elevated privileges. The vulnerability's CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H, which suggests high privileges but the description states remote initiation, so possibly a discrepancy), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor was notified early and responded professionally by releasing a fixed firmware version. While no public exploits are currently known, the public disclosure increases the risk of exploitation. The vulnerability affects only the specific firmware version 251208 of the NU516U1 model, limiting the scope but still posing a risk to users of this device. The vulnerability allows attackers to manipulate firewall.cgi parameters to inject commands, potentially leading to unauthorized control over the device, data leakage, or disruption of network services.
Potential Impact
The primary impact of CVE-2026-3704 is unauthorized remote command execution on affected Wavlink NU516U1 devices, which can compromise device integrity and availability. Attackers could manipulate firewall settings, disrupt network traffic, or use the device as a foothold for further attacks within an organization's network. Confidentiality could be partially impacted if attackers access sensitive configuration data or intercept traffic. Although the CVSS score is medium, the ability to execute commands remotely without user interaction increases the risk. Organizations relying on this router model for network perimeter security or internal segmentation may face increased exposure to lateral movement or persistent compromise. The vulnerability could also be leveraged in botnet formation or as part of larger multi-stage attacks. Given the limited affected firmware version, the overall global impact is contained but significant for users of this specific device and firmware.
Mitigation Recommendations
Organizations should immediately verify if they are using Wavlink NU516U1 devices running firmware version 251208 and upgrade to the latest patched firmware released by Wavlink. Network administrators should restrict access to the router's management interfaces, especially the /cgi-bin/firewall.cgi endpoint, by limiting it to trusted IP addresses or internal networks. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Monitor network traffic for unusual activity or command injection attempts targeting the firewall CGI scripts. Implement strict firewall rules to block unauthorized remote access to router management interfaces. Regularly audit and update device firmware to ensure all security patches are applied promptly. If upgrading firmware is not immediately possible, consider disabling remote management features or restricting them via VPN or secure channels. Finally, maintain an inventory of network devices and their firmware versions to quickly identify and remediate vulnerable assets.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-07T08:56:16.000Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69acf60f2904315ca36302db
Added to database: 3/8/2026, 4:07:43 AM
Last enriched: 3/8/2026, 4:21:59 AM
Last updated: 3/8/2026, 5:16:37 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.