Home

Description

A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.

PUBLISHED Reserved 2026-03-14 | Published 2026-03-15 | Updated 2026-03-17 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Cross Site Scripting

Code Injection

Product status

240425
affected

Timeline

2026-03-14:Advisory disclosed
2026-03-14:VulDB entry created
2026-03-14:VulDB entry last update

Credits

LtzHust2 (VulDB User) reporter

VulDB coordinator

References

vuldb.com/?id.351073 (VDB-351073 | Wavlink WL-NU516U1 login.cgi sub_404F68 cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.351073 (VDB-351073 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.769652 (Submit #769652 | Wavlink WL-NU516U1 V240425 Cross Site Scripting) third-party-advisory

vuldb.com/?submit.769653 (Submit #769653 | Wavlink WL-NU516U1 V240425 Cross Site Scripting (Duplicate)) third-party-advisory

github.com/...g/vul_db/blob/main/WL-NU516U1/vul_14/README.md related

github.com/...g/vul_db/blob/main/WL-NU516U1/vul_15/README.md exploit

cve.org (CVE-2026-4166)

nvd.nist.gov (CVE-2026-4166)

Download JSON