Description
A vulnerability was determined in Wavlink WL-NU516U1 V240425. This affects the function sub_405AF4 of the file /cgi-bin/adm.cgi of the component OTA Online Upgrade. This manipulation of the argument firmware_url causes command injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure.
References (4)
Core 4
Core References
Permissions Required, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.349220
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.349220
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.754668
Third Party Advisory exploit
https://github.com/Wlz1112/WAVLINK-NU516-V240425/blob/main/firmware_url.md
Scores
CVSS v3
7.2
EPSS
0.0046
EPSS Percentile
64.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-74
CWE-77
Status
published
Products (1)
wavlink/wl-nu516u1_firmware
m16u1_v240425
Published
Mar 06, 2026
Tracked Since
Mar 06, 2026