CVE-2026-3715
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely exploit a vulnerability in the Wavlink WL-WN579X3-C firmware to execute arbitrary code on the device by manipulating a specific setting, which could lead to full control over the device. To protect against this risk, users should upgrade to the latest firmware version as soon as possible.
Technical Description
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
wavlink
Product
wl-wn579x3-c firmware
Related Vulnerabilities
This vulnerability allows an attacker to execute cross-site scripting (XSS) attacks remotely by manipulating the Hostname argument in the device's firmware. To exploit this, the attacker needs to send a specially crafted request to the affected device, which can lead to unauthorized actions or data theft from users interacting with the device.
An attacker can remotely execute commands on the Wavlink WL-NU516U1 device by manipulating a specific setting in its firmware. This vulnerability requires no special access, making it a significant risk for anyone using this device.
An attacker can remotely execute arbitrary commands on the Wavlink WL-NU516U1 device due to a flaw in its firmware that allows them to manipulate a specific function. This vulnerability requires no special access, making it relatively easy for an attacker to exploit if they know how.
An attacker can remotely execute malicious commands on the Wavlink WL-NU516U1 device by exploiting a flaw in its firewall settings. This vulnerability can be triggered by manipulating a specific input, and it affects devices with firmware versions up to December 8, 2025.
This vulnerability allows an attacker to remotely crash the Wavlink WL-NU516U1 device or potentially take control of it by exploiting a flaw in how the device handles time zone settings. Although the attack is complex and difficult to execute, public exploit code is available, making it a real threat to unpatched devices.