๐Ÿ” CVE Alert

CVE-2026-3715

HIGH 8.8

Wavlink WL-WN579X3-C firewall.cgi sub_40139C stack-based overflow

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

CWE CWE-121 CWE-119
Vendor wavlink
Product wl-wn579x3-c
Published Mar 8, 2026
Last Updated Mar 11, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink wl-wn579x3-c

Be the first to know when new high vulnerabilities affecting wavlink wl-wn579x3-c are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / WL-WN579X3-C
231124

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.349660 vuldb.com: https://vuldb.com/?ctiid.349660 vuldb.com: https://vuldb.com/?submit.765325 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-WN579X3-C/vul_17/README.md dl.wavlink.com: https://dl.wavlink.com/firmware/RD/WN579X3C_WAVLINK_V20260226_WO_cb3003b2.bin

Credits

๐Ÿ” LtzHuster (VulDB User) VulDB