CVE-2026-4166
Wavlink WL-NU516U1 login.cgi sub_404F68 cross site scripting
CVSS Score
3.5
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
| CWE | CWE-79 CWE-94 |
| Vendor | wavlink |
| Product | wl-nu516u1 |
| Published | Mar 15, 2026 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for wavlink wl-nu516u1
Be the first to know when new low vulnerabilities affecting wavlink wl-nu516u1 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
Wavlink / WL-NU516U1
240425
References
vuldb.com: https://vuldb.com/?id.351073 vuldb.com: https://vuldb.com/?ctiid.351073 vuldb.com: https://vuldb.com/?submit.769652 vuldb.com: https://vuldb.com/?submit.769653 github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-NU516U1/vul_14/README.md github.com: https://github.com/Litengzheng/vul_db/blob/main/WL-NU516U1/vul_15/README.md
Credits
๐ LtzHust2 (VulDB User) VulDB