{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3703","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-07T08:56:07.678Z","datePublished":"2026-03-08T04:32:09.200Z","dateUpdated":"2026-03-10T14:00:43.592Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-08T04:32:09.200Z"},"title":"Wavlink NU516U1 login.cgi sub_401A10 out-of-bounds write","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-787","lang":"en","description":"Out-of-bounds Write"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"Wavlink","product":"NU516U1","versions":[{"version":"251208","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":9.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"CRITICAL"}},{"cvssV3_1":{"version":"3.1","baseScore":9.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","baseSeverity":"CRITICAL"}},{"cvssV3_0":{"version":"3.0","baseScore":9.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","baseSeverity":"CRITICAL"}},{"cvssV2_0":{"version":"2.0","baseScore":10,"vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-03-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-07T10:01:31.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"haimianbaobao (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.349649","name":"VDB-349649 | Wavlink NU516U1 login.cgi sub_401A10 out-of-bounds write","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.349649","name":"VDB-349649 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.759226","name":"Submit #759226 | Wavlink NU516U1  V251208 Stack-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md","tags":["related"]},{"url":"https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/ipaddr.md#exp-exploit--poc","tags":["exploit"]},{"url":"https://dl.wavlink.com/firmware/RD/WINSTAR_NU516U1-WO-A-2026-02-27-2fcf6ae-mt7628-squashfs-sysupgrade.bin","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-10T14:00:28.817105Z","id":"CVE-2026-3703","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-10T14:00:43.592Z"}}]}}