Impact
A flaw in the wzdap function of the /cgi-bin/adm.cgi script on the Wavlink NU516U1 allows an attacker to inject arbitrary OS commands via the EncrypType/wl_Pass argument. The supplied value is passed directly to the operating system without validation, giving the attacker control over system command execution. The weakness touches both CWE‑77 (OS Command Injection) and CWE‑78 (OS Command Injection through Input).
Affected Systems
The affected vendor is Wavlink, with the specific product model NU516U1. The vulnerability exists in firmware build M16U1_V240425. No other versions or models are listed as affected.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity, and the EPSS score is not available. The vulnerability is not listed in the CISA KEV catalog. The flaw can be triggered remotely via HTTP requests to /cgi-bin/adm.cgi, and a public exploit is available. Once exploited, an attacker can run arbitrary commands on the device, potentially leading to full system compromise.
OpenCVE Enrichment