Command Injection Vulnerability in Wavlink NU516U1 Firewall
CVE-2025-10964
Key Information:
Badges
What is CVE-2025-10964?
A security flaw has been discovered in the Wavlink NU516U1 device, specifically within the sub_401B30 function of the /cgi-bin/firewall.cgi file. This vulnerability allows an attacker to manipulate the remoteManagementEnabled argument, potentially leading to command injection. This means that attackers could execute arbitrary commands remotely, compromising the security of the device. Public exploits are available, raising concerns for users who have not patched this vulnerability. The vendor has been previously informed about this issue but has not responded.
Affected Version(s)
NU516U1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved