Command Injection Vulnerability in Wavlink NU516U1 Router
CVE-2025-10958
Key Information:
Badges
What is CVE-2025-10958?
A command injection vulnerability exists in the Wavlink NU516U1 router, specifically in the AddMac page's processing function. By manipulating the 'macAddr' argument within the /cgi-bin/wireless.cgi file, an attacker can execute arbitrary commands. This flaw allows for remote exploitation, potentially compromising the device and affecting network security. Despite early notification, the vendor has not provided a response regarding this vulnerability, raising concerns about its impact on users.
Affected Version(s)
NU516U1 M16U1_V240425
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved