Description
A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
Problem types
Product status
Timeline
| 2026-03-14: | Advisory disclosed |
| 2026-03-14: | VulDB entry created |
| 2026-03-14: | VulDB entry last update |
Credits
LtzHust2 (VulDB User)
VulDB
References
vuldb.com/?id.351073 (VDB-351073 | Wavlink WL-NU516U1 login.cgi sub_404F68 cross site scripting)
vuldb.com/?ctiid.351073 (VDB-351073 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.769652 (Submit #769652 | Wavlink WL-NU516U1 V240425 Cross Site Scripting)
vuldb.com/?submit.769653 (Submit #769653 | Wavlink WL-NU516U1 V240425 Cross Site Scripting (Duplicate))
github.com/...g/vul_db/blob/main/WL-NU516U1/vul_14/README.md
github.com/...g/vul_db/blob/main/WL-NU516U1/vul_15/README.md