Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-61128

CVE-2025-61128: WAVLINK Router Buffer Overflow Vulnerability

CVE-2025-61128 is a stack-based buffer overflow in WAVLINK QUANTUM D3G routers enabling remote code execution. This article covers the technical details, affected firmware versions, security impact, and mitigation.

Published: March 11, 2026

CVE-2025-61128 Overview

A critical stack-based buffer overflow vulnerability has been identified in WAVLINK QUANTUM D3G/WL-WN530HG3 router firmware version M30HG3_V240730. This vulnerability allows remote attackers to execute arbitrary code by sending a specially crafted HTTP POST request with a malicious referrer value to the login.cgi endpoint. The flaw exists in the firmware's handling of the referrer header during authentication requests, where insufficient bounds checking allows attackers to overflow a stack buffer and potentially gain complete control over the affected device.

Critical Impact

Unauthenticated remote attackers can execute arbitrary code on vulnerable WAVLINK routers, potentially leading to complete device compromise, network infiltration, and use of the device in botnet operations.

Affected Products

  • WAVLINK QUANTUM D3G (WL-WN530HG3) with firmware version M30HG3_V240730
  • Potentially other WAVLINK router models with similar firmware implementations

Discovery Timeline

  • 2025-10-28 - CVE-2025-61128 published to NVD
  • 2025-10-30 - Last updated in NVD database

Technical Details for CVE-2025-61128

Vulnerability Analysis

This vulnerability is classified as CWE-121 (Stack-based Buffer Overflow), a memory corruption flaw that occurs when the login.cgi handler processes HTTP POST requests without properly validating the length of the referrer header value. When an attacker sends an HTTP POST request to the login endpoint with an oversized or specially crafted referrer value, the firmware copies this data into a fixed-size stack buffer without adequate bounds checking. This allows the attacker to overwrite adjacent stack memory, including the return address, enabling control flow hijacking and arbitrary code execution.

The vulnerability is particularly severe in the context of IoT/embedded devices because WAVLINK routers typically run with elevated privileges, and successful exploitation grants the attacker full control over the network appliance. This can be leveraged for persistent network access, traffic interception, or enrollment of the device into botnets targeting other infrastructure.

Root Cause

The root cause of this vulnerability lies in unsafe string handling within the login.cgi CGI script or its underlying processing functions. The firmware fails to validate the length of user-supplied input in the HTTP referrer header before copying it to a stack-allocated buffer. This classic buffer overflow pattern allows attackers to inject shellcode or ROP chains that execute with the privileges of the web server process running on the router.

Attack Vector

The attack is conducted over the network by sending a malicious HTTP POST request to the router's web administration interface, specifically targeting the /login.cgi endpoint. The attacker crafts a request containing an oversized or malformed referrer header value designed to overflow the stack buffer. Since no authentication is required to reach the vulnerable code path, this represents a pre-authentication remote code execution vulnerability.

The exploitation involves sending an HTTP POST request with a crafted referrer header that exceeds the expected buffer size, overwriting the saved return address on the stack. By carefully constructing the overflow payload, an attacker can redirect program execution to shellcode or leverage return-oriented programming techniques to achieve arbitrary code execution.

Technical details and a proof-of-concept are available in the GitHub Gist PoC Code published by the security researcher.

Detection Methods for CVE-2025-61128

Indicators of Compromise

  • Unusual HTTP POST requests to /login.cgi with abnormally large referrer header values
  • Unexpected outbound connections from WAVLINK router devices to unknown IP addresses
  • Router configuration changes or unauthorized administrative access
  • Presence of unknown processes or services running on the affected device

Detection Strategies

  • Implement network intrusion detection rules to identify HTTP requests with oversized referrer headers targeting WAVLINK device endpoints
  • Monitor for anomalous traffic patterns originating from router management interfaces
  • Deploy web application firewall rules to block malformed HTTP requests to CGI endpoints

Monitoring Recommendations

  • Enable logging on WAVLINK routers if available and monitor for authentication anomalies
  • Implement network segmentation to isolate IoT devices from critical infrastructure
  • Use network monitoring tools to detect unusual traffic volumes or connection patterns from router devices

How to Mitigate CVE-2025-61128

Immediate Actions Required

  • Restrict access to the router's web administration interface by IP address or disable remote management if not required
  • Place affected WAVLINK routers behind a firewall that blocks external access to the management interface
  • Monitor WAVLINK's official channels for firmware updates addressing this vulnerability
  • Consider replacing affected devices with alternatives from vendors with better security track records if patches are not available

Patch Information

At the time of publication, no official patch information is available from WAVLINK. Users should monitor the vendor's support website and apply firmware updates as soon as they become available. Given the critical nature of this vulnerability, organizations should prioritize network isolation of affected devices until patches are released.

Workarounds

  • Disable the web administration interface entirely if it is not required for operations
  • Implement strict firewall rules to allow management interface access only from trusted internal IP addresses
  • Enable any available access control features on the router to limit exposure
  • Consider network-level protections such as VPN-only access to the management interface
bash
# Example iptables rule to restrict access to router management interface
# Apply on upstream firewall or network gateway
iptables -A FORWARD -d <ROUTER_IP> -p tcp --dport 80 -j DROP
iptables -A FORWARD -d <ROUTER_IP> -p tcp --dport 443 -j DROP
# Allow only from trusted management subnet
iptables -I FORWARD -s 192.168.1.0/24 -d <ROUTER_IP> -p tcp --dport 80 -j ACCEPT

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechWavlink

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.12%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-121
  • Technical References
  • GitHub Gist PoC Code
  • Related CVEs
  • CVE-2026-5004: Wavlink WL-WN579X3 Buffer Overflow Flaw

  • CVE-2026-4861: Wavlink WL-NU516U1 Buffer Overflow Flaw

  • CVE-2026-3703: Wavlink WL-NU516U1 Buffer Overflow Flaw

  • CVE-2026-3715: Wavlink WL-WN579X3-C Buffer Overflow Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English