


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of t…
Published:
7 March 2026 at 23:00:00
Alert date:
8 March 2026 at 08:01:01
Source:
nvd.nist.gov
Network Infrastructure, Mobile & IoT
A stack-based buffer overflow vulnerability (CVE-2026-3715) was discovered in Wavlink WL-WN579X3-C router version 231124. The vulnerability affects the sub_40139C function in /cgi-bin/firewall.cgi through manipulation of the del_flag argument. The flaw can be exploited remotely and public exploits are available. The vendor has released a fixed version 20260226 to address this issue. Users are advised to upgrade immediately to mitigate the risk.
Technical details
Mitigation steps:
Affected products:
Wavlink WL-WN579X3-C
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-3715
https://dl.wavlink.com/firmware/RD/WN579X3C_WAVLINK_V20260226_WO_cb3003b2.bin
https://github.com/Litengzheng/vul_db/blob/main/WL-WN579X3-C/vul_17/README.md
https://vuldb.com/?ctiid.349660
https://vuldb.com/?id.349660
https://vuldb.com/?submit.765325
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
