This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical buffer overflow in Wavlink NU516U1. π₯ **Consequences**: Out-of-bounds write leading to potential Remote Code Execution (RCE) or system crash. CVSS Score is **HIGHEST** (9.8).
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: CWE-787 (Out-of-bounds Write). π **Flaw**: Improper handling of the `ipaddr` parameter in function `sub_401A10` within `/cgi-bin/login.cgi`.
π **Attacker Capabilities**: Full Control! High Confidentiality, Integrity, and Availability impact. Can likely execute arbitrary code or crash the device remotely.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Exploitation Threshold**: **LOW**. CVSS Vector shows `AV:N` (Network), `AC:L` (Low Complexity), `PR:N` (No Privileges Required). Easy to exploit!
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exploit**: **YES**. GitHub PoC exists (`Wlz1112/Wavlink-NU516U1-V251208-`). Wild exploitation is highly probable given the simplicity.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: Scan for Wavlink NU516U1 devices running firmware **251208**. Look for exposed `/cgi-bin/login.cgi` endpoints accepting `ipaddr` parameters.