CVE-2026-3715
Wavlink WL-WN579X3-C firewall.cgi sub_40139C stack-based overflow
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
| CWE | CWE-121 CWE-119 |
| Vendor | wavlink |
| Product | wl-wn579x3-c |
| Published | Mar 8, 2026 |
| Last Updated | Mar 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for wavlink wl-wn579x3-c
Be the first to know when new high vulnerabilities affecting wavlink wl-wn579x3-c are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Wavlink / WL-WN579X3-C
231124
References
vuldb.com: https://vuldb.com/?id.349660 vuldb.com: https://vuldb.com/?ctiid.349660 vuldb.com: https://vuldb.com/?submit.765325 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579X3-C/vul_17/README.md dl.wavlink.com: https://dl.wavlink.com/firmware/RD/WN579X3C_WAVLINK_V20260226_WO_cb3003b2.bin
Credits
๐ LtzHuster (VulDB User) VulDB