Description
A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

A flaw exists in the function sub_404F68 of the /cgi-bin/login.cgi file on Wavlink WL‑NU516U1 firmware 240425. Manipulating the homepage/hostname parameter triggers a client‑side cross‑site scripting vulnerability that can be exploited remotely. An attacker may inject malicious scripts into the browser of anyone who accesses the affected login page, potentially enabling cookie theft, session hijacking or additional client‑side attacks. The weakness is identified as CWE‑79, with an additional CWE‑94 reference that may relate to code injection possibilities.

Affected Systems

The vulnerability affects Wavlink WL‑NU516U1 routers running firmware version 240425. The CPE string cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:* points to this specific device model and firmware, with no narrower sub‑version scope provided.

Risk and Exploitability

The CVSS score is 5.1, indicating moderate severity, while the EPSS score is below 1 % and the issue is not listed in the CISA KEV catalog. However, exploit code has been released publicly, increasing the likelihood of real‑world attacks. The attack vector is Remote – an adversary only needs to send a crafted HTTP request to the /cgi-bin/login.cgi endpoint. The impact is limited to the client’s browser and does not provide privilege escalation on the device. The risk is therefore primarily for users who interact with the login page, but the presence of a public exploit raises the overall threat level.

Generated by OpenCVE AI on March 17, 2026 at 17:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update that resolves the XSS flaw from the vendor’s official release.
  • If a suitable update is not available, restrict external access to the /cgi-bin/login.cgi endpoint using firewall or access‑control rules.
  • Deploy a web application firewall or similar filtering solution to block injection of malicious script payloads on the login page.

Generated by OpenCVE AI on March 17, 2026 at 17:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-nu516u1
Vendors & Products Wavlink wl-nu516u1

Sun, 15 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
Title Wavlink WL-NU516U1 login.cgi sub_404F68 cross site scripting
First Time appeared Wavlink
Wavlink wl-nu516u1 Firmware
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink
Wavlink wl-nu516u1 Firmware
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-nu516u1 Wl-nu516u1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T13:46:28.034Z

Reserved: 2026-03-14T12:30:20.703Z

Link: CVE-2026-4166

cve-icon Vulnrichment

Updated: 2026-03-17T13:46:23.568Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:55.890

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:02:02Z

Weaknesses