Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-3703 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical buffer overflow in Wavlink NU516U1. πŸ’₯ **Consequences**: Out-of-bounds write leading to potential Remote Code Execution (RCE) or system crash. CVSS Score is **HIGHEST** (9.8).

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-787 (Out-of-bounds Write). πŸ› **Flaw**: Improper handling of the `ipaddr` parameter in function `sub_401A10` within `/cgi-bin/login.cgi`.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Product**: Wavlink NU516U1 Wireless Print Server. πŸ“… **Vulnerable Version**: Firmware version **251208** specifically.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Full Control! High Confidentiality, Integrity, and Availability impact. Can likely execute arbitrary code or crash the device remotely.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. CVSS Vector shows `AV:N` (Network), `AC:L` (Low Complexity), `PR:N` (No Privileges Required). Easy to exploit!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: **YES**. GitHub PoC exists (`Wlz1112/Wavlink-NU516U1-V251208-`). Wild exploitation is highly probable given the simplicity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for Wavlink NU516U1 devices running firmware **251208**. Look for exposed `/cgi-bin/login.cgi` endpoints accepting `ipaddr` parameters.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Patch**: **YES**. A firmware update is available at `dl.wavlink.com`. Download the `WINSTAR_NU516U1-WO-A-2026-02-27` image to fix.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Isolate the device on a **VLAN**. Block external access to port 80/443. Disable remote management features if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. With CVSS 9.8 and public PoC, patch **IMMEDIATELY**. This is a high-priority vulnerability for IoT security.