Impact
The vulnerability is located in the WifiBasic function of /cgi-bin/wireless.cgi on the Wavlink NU516U1 router firmware 240425. Manipulation of the AuthMethod or EncrypType parameters allows an attacker to inject arbitrary operating‑system commands, enabling full remote code execution. An attacker who succeeds can read, modify, or delete data, tamper with the system, or launch further attacks, thereby compromising confidentiality, integrity, and availability of the device.
Affected Systems
Wavlink NU516U1, firmware version 240425.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity. EPSS information is not available, so the current exploitation probability cannot be quantified; however, the vulnerability is publicly known and can be exploited remotely through the router’s web interface. The vulnerability is not yet catalogued in CISA’s KEV list. The most likely attack vector is a remote attacker sending crafted HTTP requests to the wireless.cgi endpoint from outside the local network.
OpenCVE Enrichment