Description
A flaw has been found in Wavlink NU516U1 240425. The impacted element is the function sys_login1 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure.
Problem types
Product status
Timeline
| 2026-05-09: | Advisory disclosed |
| 2026-05-09: | VulDB entry created |
| 2026-05-09: | VulDB entry last update |
Credits
Ziyue Xie (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/362447 (VDB-362447 | Wavlink NU516U1 login.cgi sys_login1 os command injection)
vuldb.com/vuln/362447/cti (VDB-362447 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/800735 (Submit #800735 | Wavlink NU516U1 M16U1_V240425 Command Injection)
github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_9/9.md