CVE-2026-3716

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute cross-site scripting (XSS) attacks remotely by manipulating the Hostname argument in the device's firmware. To exploit this, the attacker needs to send a specially crafted request to the affected device, which can lead to unauthorized actions or data theft from users interacting with the device.

Technical Description

A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This vulnerability affects the function sub_401AD4 of the file /cgi-bin/adm.cgi. Executing a manipulation of the argument Hostname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 20260226 is able to resolve this issue. The affected component should be upgraded. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Mar 8, 2026

about 1 month ago

Last Modified

Mar 10, 2026

28 days ago

Vendor

wavlink

Product

wl-wn579x3-c firmware

Related Vulnerabilities

CVE-2026-3715High

An attacker can remotely exploit a vulnerability in the Wavlink WL-WN579X3-C firmware to execute arbitrary code on the device by manipulating a specific setting, which could lead to full control over the device. To protect against this risk, users should upgrade to the latest firmware version as soon as possible.

CVE-2026-3662Medium

An attacker can remotely execute commands on the Wavlink WL-NU516U1 device by manipulating a specific setting in its firmware. This vulnerability requires no special access, making it a significant risk for anyone using this device.

CVE-2026-3661Medium

An attacker can remotely execute arbitrary commands on the Wavlink WL-NU516U1 device due to a flaw in its firmware that allows them to manipulate a specific function. This vulnerability requires no special access, making it relatively easy for an attacker to exploit if they know how.

CVE-2026-2615High

An attacker can remotely execute malicious commands on the Wavlink WL-NU516U1 device by exploiting a flaw in its firewall settings. This vulnerability can be triggered by manipulating a specific input, and it affects devices with firmware versions up to December 8, 2025.

CVE-2026-2565Medium

This vulnerability allows an attacker to remotely crash the Wavlink WL-NU516U1 device or potentially take control of it by exploiting a flaw in how the device handles time zone settings. Although the attack is complex and difficult to execute, public exploit code is available, making it a real threat to unpatched devices.