A security vulnerability has been detected in Wavlink NU516U1 240425. Impacted is the function advance of the file /cgi-bin/wireless.cgi. Such manipulation of the argument wlan_conf/Channel/skiplist/ieee_80211h leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure.
Metrics
Affected Vendors & Products
References
History
Sun, 10 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Wavlink NU516U1 240425. Impacted is the function advance of the file /cgi-bin/wireless.cgi. Such manipulation of the argument wlan_conf/Channel/skiplist/ieee_80211h leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure. | |
| Title | Wavlink NU516U1 wireless.cgi advance os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-10T04:00:08.818Z
Reserved: 2026-05-09T07:54:51.721Z
Link: CVE-2026-8228
No data.
Status : Received
Published: 2026-05-10T05:16:12.573
Modified: 2026-05-10T05:16:12.573
Link: CVE-2026-8228
No data.
OpenCVE Enrichment
Updated: 2026-05-10T06:30:05Z