Description
A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin/firewall.cgi of the component UPNP Handler. Executing a manipulation of the argument UpnpEnabled can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The flaw occurs in the UpnpEnabled parameter handling within the UPnP handler’s firewall.cgi script. By sending a crafted value the attacker overflows the stack, allowing arbitrary code execution on the device. This can compromise confidentiality, integrity, and availability of the router and potentially any devices behind it.

Affected Systems

The vulnerability affects Wavlink routers running the WL‑WN579X3‑C model with firmware build 231124. No wider product range or version was listed.

Risk and Exploitability

With a CVSS base score of 8.7 the flaw is considered high severity. The EPSS score is below 1 %, indicating a low probability of current exploitation in the wild, and the vulnerability is not yet in CISA’s KEV catalog. Attackers can trigger the overflow remotely by targeting the upnp-enabled argument through the public interface, which implies a remote, unauthenticated attack vector.

Generated by OpenCVE AI on April 3, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Wavlink firmware update that addresses the stack-based buffer overflow in /cgi-bin/firewall.cgi
  • If a firmware update is not available, disable UPnP functionality or restrict access to firewall.cgi via the web interface
  • Implement network segmentation to isolate the router from critical devices and monitor logs for anomalous UPnP requests

Generated by OpenCVE AI on April 3, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 11:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:h:wavlink:wl-wn579x3-c:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-wn579x3-c_firmware:231124:*:*:*:*:*:*:*

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-wn579x3-c
Vendors & Products Wavlink wl-wn579x3-c

Sat, 28 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin/firewall.cgi of the component UPNP Handler. Executing a manipulation of the argument UpnpEnabled can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Wavlink WL-WN579X3-C UPNP firewall.cgi sub_4019FC stack-based overflow
First Time appeared Wavlink
Wavlink wl-wn579x3-c Firmware
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:o:wavlink:wl-wn579x3-c_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink
Wavlink wl-wn579x3-c Firmware
References
Metrics cvssV2_0

{'score': 9, 'vector': 'AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 8.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-wn579x3-c Wl-wn579x3-c Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T16:01:33.373Z

Reserved: 2026-03-27T13:51:13.122Z

Link: CVE-2026-5004

cve-icon Vulnrichment

Updated: 2026-03-30T16:01:20.100Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T18:15:57.917

Modified: 2026-04-03T11:30:16.767

Link: CVE-2026-5004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:56Z

Weaknesses