A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
PUBLISHED5.2Operating systemCWE-121CWE-119
Wavlink WL-NU516U1 nas.cgi ftext stack-based overflow
Problem type
Affected products
Wavlink
WL-NU516U1
260227 - AFFECTED
References
VDB-353192 | Wavlink WL-NU516U1 nas.cgi ftext stack-based overflow
https://vuldb.com/?id.353192
VDB-353192 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?ctiid.353192
Submit #776217 | Wavlink NU516U1 V260227 Stack-based Buffer Overflow
https://vuldb.com/?submit.776217
github.com
https://github.com/Wlz1112/WAVLINK-NU516U1-V260227/blob/main/Content-Length.md
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-4861Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-4861",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-03-26T18:28:13.605Z",
"dateReserved": "2026-03-25T16:31:03.203Z",
"datePublished": "2026-03-26T08:18:07.028Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-03-26T08:18:07.028Z"
},
"title": "Wavlink WL-NU516U1 nas.cgi ftext stack-based overflow",
"descriptions": [
{
"lang": "en",
"value": "A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "Wavlink",
"product": "WL-NU516U1",
"cpes": [
"cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:*"
],
"versions": [
{
"version": "260227",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Stack-based Buffer Overflow",
"cweId": "CWE-121",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Memory Corruption",
"cweId": "CWE-119",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.353192",
"name": "VDB-353192 | Wavlink WL-NU516U1 nas.cgi ftext stack-based overflow",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.353192",
"name": "VDB-353192 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.776217",
"name": "Submit #776217 | Wavlink NU516U1 V260227 Stack-based Buffer Overflow",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/Wlz1112/WAVLINK-NU516U1-V260227/blob/main/Content-Length.md",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR",
"baseScore": 9
}
}
],
"timeline": [
{
"time": "2026-03-25T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-03-25T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-03-25T17:36:08.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "haimianbaobao (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB",
"type": "coordinator"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-26T18:28:13.605Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}