Description
A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This affects the function wifi_region of the file /cgi-bin/adm.cgi. Such manipulation of the argument skiplist1/skiplist2 leads to os command injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
Published: 2026-05-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A remote attacker can manipulate the skiplist1 or skiplist2 parameters of the adm.cgi wifi_region function on the Wavlink NU516U1 router, triggering OS command injection and allowing arbitrary command execution on the device's operating system.

Affected Systems

The flaw is present in the Wavlink NU516U1 router, specifically firmware version M16U1_V240425. Users who expose the router’s web administration interface to the Internet or who lack proper access controls are vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity. EPSS data is unavailable but a publicly available exploit exists, and the vulnerability is not listed in CISA’s KEV catalog. The attack path involves sending crafted request parameters to adm.cgi over the network; if authentication is required, credentials for the administrative interface would need to be compromised. The known exploit and public availability imply a realistic risk of exploitation, especially on devices with remote management enabled.

Generated by OpenCVE AI on May 9, 2026 at 19:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the official firmware update from Wavlink that resolves the wifi_region command injection on the NU516U1 router.
  • If an update cannot be applied immediately, disable or restrict remote access to the adm.cgi interface so it is only reachable from the local network or by trusted IP addresses.
  • Enable logging or IDS alerts for anomalous command execution or unauthorized outbound traffic originating from the router.

Generated by OpenCVE AI on May 9, 2026 at 19:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This affects the function wifi_region of the file /cgi-bin/adm.cgi. Such manipulation of the argument skiplist1/skiplist2 leads to os command injection. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure.
Title Wavlink NU516U1 adm.cgi wifi_region os command injection
Weaknesses CWE-77
CWE-78
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-09T18:15:10.184Z

Reserved: 2026-05-08T19:52:11.621Z

Link: CVE-2026-8191

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T19:16:09.093

Modified: 2026-05-09T19:16:09.093

Link: CVE-2026-8191

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T19:30:40Z

Weaknesses