No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wl-nu516u1 |
|
| Vendors & Products |
Wavlink
Wavlink wl-nu516u1 |
Mon, 16 Feb 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Wavlink WL-NU516U1 20251208. Affected by this issue is the function sub_40785C of the file /cgi-bin/adm.cgi. This manipulation of the argument time_zone causes stack-based buffer overflow. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation is known to be difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Wavlink WL-NU516U1 adm.cgi sub_40785C stack-based overflow | |
| Weaknesses | CWE-119 CWE-121 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-17T14:45:06.607Z
Reserved: 2026-02-15T19:40:00.897Z
Link: CVE-2026-2565
Updated: 2026-02-17T14:45:00.468Z
Status : Received
Published: 2026-02-16T17:18:09.360
Modified: 2026-02-16T17:18:09.360
Link: CVE-2026-2565
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:49:27Z