CVE-2026-2566:
CVE-2026-2566
A security vulnerability has been detected in Wavlink WL-NU516U1 up to 130/260. This affects the function sub_406194 of the file /cgi-bin/adm.cgi. Such manipulation of the argument firmware_url leads ...
Overview
A critical security flaw has been identified in specific Wavlink wireless range extender models. This vulnerability allows a remote attacker to send specially crafted data to the device, which can cause a system crash or potentially allow the attacker to take control of the device.
Vulnerability Details
The vulnerability exists in the administrative web interface (/cgi-bin/adm.cgi) of the affected Wavlink devices. A specific function responsible for handling firmware update URLs does not properly validate the length of user-supplied input. By supplying an overly long web address (URL) in a network request, an attacker can overflow a memory buffer on the device. This type of flaw is known as a stack-based buffer overflow.
Because the vulnerable interface is accessible over the network, the attack can be performed remotely without any prior authentication.
Affected Products
- Wavlink WL-NU516U1 (AC1200 Dual Band WiFi Range Extender) with firmware version 130/260 and earlier versions.
Potential Impact
If successfully exploited, this vulnerability could allow an attacker to:
- Disrupt Service: Crash the device, causing a denial-of-service for connected users.
- Execute Arbitrary Code: Potentially run malicious code on the device with full system privileges.
- Compromise the Network: Use the compromised device as a foothold to launch further attacks on other devices within the local network.
A functional exploit for this vulnerability has been made publicly available, increasing the risk of active attacks.
Remediation and Mitigation
As the vendor has not provided an official patch or response, the following actions are strongly recommended:
- Isolate Affected Devices: Immediately remove the affected Wavlink range extenders from critical network segments. Place them on a segregated guest or IoT network to limit potential lateral movement if compromised.
- Monitor for Updates: Regularly check the official Wavlink support website for firmware updates addressing CVE-2026-2566. Apply any available patch immediately upon release.
- Restrict Access: If the device must remain in service, use firewall rules to block all external WAN (internet) access to its web administration interface (typically ports 80/HTTP and 443/HTTPS). Ensure it is only accessible from trusted, internal management networks if remote management is absolutely necessary.
- Consider Replacement: Given the lack of vendor response and the high severity of the flaw, organizations should evaluate replacing affected hardware with a product from a vendor that provides active security support and timely patches.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument P...
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory....
A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The at...
A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. T...