CVE Alert: CVE-2026-3715 - Wavlink - WL-WN579X3-C - RedPacket Security

A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of

RedPacket Security
🚨 CRITICAL: CVE-2026-3703 in Wavlink NU516U1 (firmware 251208) allows remote, unauthenticated out-of-bounds write via /cgi-bin/login.cgi. Public exploit available — patch immediately! Monitor for abnormal ipaddr activity. https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c #OffSeq #Vuln #RouterSecurity #Wavlink
CVE Alert: CVE-2026-3613 - Wavlink - WL-NU516U1 - RedPacket Security

A vulnerability was identified in Wavlink WL-NU516U1 V240425. This vulnerability affects the function sub_401A0C of the file /cgi-bin/login.cgi. Such

RedPacket Security
CVE Alert: CVE-2026-3612 - Wavlink - WL-NU516U1 - RedPacket Security

A vulnerability was determined in Wavlink WL-NU516U1 V240425. This affects the function sub_405AF4 of the file /cgi-bin/adm.cgi of the component OTA Online

RedPacket Security
installed 4 cams and a dvr this morning, went smooth #wavlink
CVE Alert: CVE-2026-2615 - Wavlink - WL-NU516U1 - RedPacket Security

A flaw has been found in Wavlink WL-NU516U1 up to 20251208. The affected element is the function singlePortForwardDelete of the file /cgi-bin/firewall.cgi.

RedPacket Security
CVE Alert: CVE-2026-2566 - Wavlink - WL-NU516U1 - RedPacket Security

A security vulnerability has been detected in Wavlink WL-NU516U1 up to 130/260. This affects the function sub_406194 of the file /cgi-bin/adm.cgi. Such

RedPacket Security
CVE Alert: CVE-2026-2567 - Wavlink - WL-NU516U1 - RedPacket Security

A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the function sub_401218 of the file /cgi-bin/nas.cgi. Performing a

RedPacket Security
CVE-2026-2567: HIGH severity stack buffer overflow in Wavlink WL-NU516U1 (20251208). Exploitable via /cgi-bin/nas.cgi by authenticated users. Public exploit exists — apply updates & restrict access! https://radar.offseq.com/threat/cve-2026-2567-stack-based-buffer-overflow-in-wavli-0c1e9353 #OffSeq #Vulnerability #Cybersecurity #Wavlink
@jasonkarns
Yep. The brand is #Wavlink. To their credit, they've been prompt about sending a replacement each time it's happened, but I've only had it since June, and this is the third failure. Their customer service is great, but their QC... Not so much.