Impact
The vulnerability exists in the wan function of /cgi-bin/adm.cgi on Wavlink NU516U1 routers. By manipulating the ppp_username, ppp_passwd, rwan_ip, rwan_mask, or rwan_gateway parameters, an attacker can inject arbitrary operating system commands. The attacker can then execute those commands remotely with the privileges of the web interface process, potentially taking control of the device, exfiltrating data, or using the router as part of a larger attack chain.
Affected Systems
The flaw was found on Wavlink NU516U1 devices running the M16U1_V240425 firmware release. No other product or version information is listed.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate overall risk. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting limited known exploitation. The attack vector is inferred to be remote over the network, requiring the attacker to send a crafted HTTP request to the device’s administrative interface. While the vulnerability is publicly disclosed, there are no confirmed large-scale attacks reported in the public record.
OpenCVE Enrichment