Impact
The flaw is located in the sub_406194 function of /cgi-bin/adm.cgi on Wavlink WL‑NU516U1 firmware up to 130/260. A crafted firmware_url argument can overflow a stack buffer, which may lead to arbitrary code execution or a crash. The vulnerability is a classic buffer overflow, classified as CWE‑119 and CWE‑121.
Affected Systems
All Wavlink WL‑NU516U1 routers running firmware versions 130 and 260 that expose the /cgi-bin/adm.cgi interface are affected. No other Wavlink products or firmware revisions are listed as vulnerable.
Risk and Exploitability
The CVSS score of 8.6 signals high severity. The EPSS score is less than 1 %, indicating that the likelihood of widespread exploitation is currently low, though a public exploit has been disclosed and the vulnerability is not in the CISA KEV catalog. The attack vector is remote, exploiting the web interface; no privileged local access is required. If an attacker can reach the router’s admin CGI, the stack overflow could be triggered, potentially compromising the device. This risk is medium‑high for devices with remote management enabled.
OpenCVE Enrichment