Impact
Wavlink WL-NU516U1 devices running firmware 260227 are vulnerable due to a stack-based buffer overflow in the ftext function of /cgi-bin/nas.cgi. The vulnerability is triggered by manipulating the Content-Length HTTP header, allowing an attacker to overflow a buffer on the server-side stack. If successfully exploited, this can lead to arbitrary code execution, compromise of the device, data leakage, or denial of service. The weakness is classified under CWE-119 and CWE-121, indicating a classic memory corruption and stack frame tampering scenario.
Affected Systems
The affected product is Wavlink WL-NU516U1 NAS units, specifically the firmware version 260227. Other firmware revisions are not known to be impacted, but all devices from the WL-NU516U1 line should be considered potentially vulnerable until verified.
Risk and Exploitability
The CVSS score for this flaw is 8.7, indicating high severity. No EPSS score is available, and the vulnerability is not listed as a known exploited vulnerability (KEV). The attack can be launched remotely by sending crafted HTTP requests to the /cgi-bin/nas.cgi endpoint. An attacker must have network connectivity to the NAS, and no authentication is required. Because the exploit code has been published publicly, the risk to exposed devices is significant.
OpenCVE Enrichment