Description
A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the function usb_p910 of the file /cgi-bin/adm.cgi. Such manipulation of the argument Pr_mode leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
Published: 2026-03-07
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Command injection via web interface
Action: Patch
AI Analysis

Impact

A vulnerability exists in the Wavlink WL‑NU516U1 router’s adm.cgi script; manipulating the Pr_mode argument in the usb_p910 function leads to execution of arbitrary shell commands on the device. The flaw is rooted in improper input handling (CWE‑74, CWE‑77). An attacker who can reach the router’s web administration interface can exploit the injection without needing local privileges, enabling full remote compromise of the device and related network.

Affected Systems

Systems affected are Wavlink WL‑NU516U1 routers running firmware version 240425. The issue is confined to the usb_p910 handler in /cgi-bin/adm.cgi; other firmware revisions or models are not reported to be impacted.

Risk and Exploitability

The CVSS base score of 5.1 denotes moderate risk, and the EPSS score of less than 1% points to a low probability of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog, but it has been publicly disclosed and an attacker can launch the exploit over the network using the HTTP administration interface. Authentication requirements are not stated in the description; the lack of an explicit requirement suggests that the vulnerable endpoint may be accessible without authentication, which would increase the attack surface. Until a patch is applied, the risk remains that an attacker could execute commands remotely on the device.

Generated by OpenCVE AI on April 17, 2026 at 12:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Wavlink that removes the vulnerable usb_p910 handling in adm.cgi.
  • Configure network firewall rules to limit access to the router’s HTTP administration interface (e.g., /cgi-bin/adm.cgi) to trusted internal IP addresses or block it entirely from external networks.
  • If a firmware update is not yet available, disable remote administration or the usb_p910 functionality in the router’s settings to stop the vulnerable parameter from being processed.
  • Ensure that input validation for the Pr_mode parameter is properly implemented to prevent injection, addressing CWE‑74 and CWE‑77.

Generated by OpenCVE AI on April 17, 2026 at 12:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wavlink wl-nu516u1
Vendors & Products Wavlink wl-nu516u1

Sat, 07 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the function usb_p910 of the file /cgi-bin/adm.cgi. Such manipulation of the argument Pr_mode leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
Title Wavlink WL-NU516U1 adm.cgi usb_p910 command injection
First Time appeared Wavlink
Wavlink wl-nu516u1 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wavlink
Wavlink wl-nu516u1 Firmware
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Wavlink Wl-nu516u1 Wl-nu516u1 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:29:28.566Z

Reserved: 2026-03-06T20:29:07.398Z

Link: CVE-2026-3662

cve-icon Vulnrichment

Updated: 2026-03-11T16:23:14.646Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T14:16:06.357

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3662

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses