CVE-2026-4166: Cross Site Scripting in Wavlink WL-NU516U1
A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
AI Analysis
Technical Summary
CVE-2026-4166 is a cross-site scripting vulnerability identified in the Wavlink WL-NU516U1 wireless router firmware version 240425. The issue resides in the CGI script /cgi-bin/login.cgi, specifically within the function sub_404F68, which processes the homepage/hostname parameter. Due to insufficient input validation and sanitization, an attacker can craft a malicious URL embedding JavaScript code in this parameter. When a user accesses this URL, the injected script executes within the context of the router's web management interface, potentially compromising the confidentiality and integrity of the user's session. The vulnerability is remotely exploitable without authentication, though it requires the victim to interact with the malicious link. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation but limited impact scope and the need for user interaction. No authentication or privileges are required, increasing the attack surface. The vendor was informed early, but as of the publication date, no official patch or mitigation has been released. Public exploit code is available, increasing the risk of opportunistic attacks targeting users of this router model. This vulnerability highlights the importance of robust input validation in embedded web interfaces of network devices.
Potential Impact
The primary impact of CVE-2026-4166 is the potential for attackers to execute arbitrary JavaScript code in the context of the router’s web management interface. This can lead to session hijacking, theft of authentication cookies, redirection to malicious sites, or phishing attacks targeting network administrators or users managing the device. While the vulnerability does not directly compromise the router’s firmware or network traffic, successful exploitation can undermine the integrity and confidentiality of the management session, potentially allowing further attacks or unauthorized configuration changes if combined with other vulnerabilities. Organizations relying on the Wavlink WL-NU516U1 for network connectivity may face increased risk of targeted attacks, especially in environments where users frequently access the router’s web interface. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in phishing or social engineering scenarios. The absence of a patch increases exposure time, and public exploit availability may lead to increased scanning and exploitation attempts. Overall, the vulnerability poses a moderate risk to network security and operational integrity.
Mitigation Recommendations
To mitigate CVE-2026-4166, organizations should first check for any firmware updates or patches released by Wavlink addressing this vulnerability and apply them immediately. In the absence of an official patch, administrators should restrict access to the router’s web management interface by limiting it to trusted internal networks and disabling remote management if enabled. Implement network-level controls such as firewall rules to block unauthorized access to the router’s management ports (typically TCP 80/443). Educate users and administrators about the risks of clicking on unsolicited or suspicious links that could exploit this XSS vulnerability. Employ web browser security features such as disabling JavaScript on the router’s management domain or using browser extensions that block cross-site scripting attacks. Monitor network traffic and logs for unusual access patterns or repeated attempts to exploit the vulnerability. Consider segmenting network management interfaces away from general user networks to reduce exposure. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Affected Countries
United States, China, Germany, United Kingdom, France, India, Brazil, Russia, Japan, South Korea
CVE-2026-4166: Cross Site Scripting in Wavlink WL-NU516U1
Description
A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4166 is a cross-site scripting vulnerability identified in the Wavlink WL-NU516U1 wireless router firmware version 240425. The issue resides in the CGI script /cgi-bin/login.cgi, specifically within the function sub_404F68, which processes the homepage/hostname parameter. Due to insufficient input validation and sanitization, an attacker can craft a malicious URL embedding JavaScript code in this parameter. When a user accesses this URL, the injected script executes within the context of the router's web management interface, potentially compromising the confidentiality and integrity of the user's session. The vulnerability is remotely exploitable without authentication, though it requires the victim to interact with the malicious link. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the ease of remote exploitation but limited impact scope and the need for user interaction. No authentication or privileges are required, increasing the attack surface. The vendor was informed early, but as of the publication date, no official patch or mitigation has been released. Public exploit code is available, increasing the risk of opportunistic attacks targeting users of this router model. This vulnerability highlights the importance of robust input validation in embedded web interfaces of network devices.
Potential Impact
The primary impact of CVE-2026-4166 is the potential for attackers to execute arbitrary JavaScript code in the context of the router’s web management interface. This can lead to session hijacking, theft of authentication cookies, redirection to malicious sites, or phishing attacks targeting network administrators or users managing the device. While the vulnerability does not directly compromise the router’s firmware or network traffic, successful exploitation can undermine the integrity and confidentiality of the management session, potentially allowing further attacks or unauthorized configuration changes if combined with other vulnerabilities. Organizations relying on the Wavlink WL-NU516U1 for network connectivity may face increased risk of targeted attacks, especially in environments where users frequently access the router’s web interface. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in phishing or social engineering scenarios. The absence of a patch increases exposure time, and public exploit availability may lead to increased scanning and exploitation attempts. Overall, the vulnerability poses a moderate risk to network security and operational integrity.
Mitigation Recommendations
To mitigate CVE-2026-4166, organizations should first check for any firmware updates or patches released by Wavlink addressing this vulnerability and apply them immediately. In the absence of an official patch, administrators should restrict access to the router’s web management interface by limiting it to trusted internal networks and disabling remote management if enabled. Implement network-level controls such as firewall rules to block unauthorized access to the router’s management ports (typically TCP 80/443). Educate users and administrators about the risks of clicking on unsolicited or suspicious links that could exploit this XSS vulnerability. Employ web browser security features such as disabling JavaScript on the router’s management domain or using browser extensions that block cross-site scripting attacks. Monitor network traffic and logs for unusual access patterns or repeated attempts to exploit the vulnerability. Consider segmenting network management interfaces away from general user networks to reduce exposure. Finally, maintain an incident response plan to quickly address any signs of compromise related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-14T12:30:20.703Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b64ae29b0f87e881b8f1b3
Added to database: 3/15/2026, 6:00:02 AM
Last enriched: 3/23/2026, 12:32:27 AM
Last updated: 4/28/2026, 3:00:38 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.