Stack-Based Buffer Overflow in Wavlink WL-WN579X3-C Network Device
CVE-2026-3715
Key Information:
- Vendor
Wavlink
- Status
- Vendor
- CVE Published:
- 8 March 2026
Badges
What is CVE-2026-3715?
A vulnerability in the Wavlink WL-WN579X3-C network device has been identified, which allows for a stack-based buffer overflow via manipulation of the 'del_flag' argument in the 'sub_40139C' function of the 'firewall.cgi' file. This flaw can be exploited remotely, posing significant risks to network security. The vendor has proactively addressed this issue, and users are urged to upgrade to version 20260226 to mitigate potential risks.
Affected Version(s)
WL-WN579X3-C 231124
WL-WN579X3-C 20260226
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
