OS Command Injection in Wavlink NU516U1 Router Affects Remote Security
CVE-2026-8191
Key Information:
Badges
What is CVE-2026-8191?
A significant OS command injection vulnerability has been discovered in the Wavlink NU516U1 router's administration interface. The vulnerability resides in the 'wifi_region' function within the '/cgi-bin/adm.cgi' script. Attackers can manipulate the parameters 'skiplist1' and 'skiplist2' to inject malicious commands with the potential for remote exploitation. This type of vulnerability poses a serious risk as it allows unauthorized execution of system commands on the router. The vendor has been informed about the issue prior to public disclosure, and potential exploits are already available.
Affected Version(s)
NU516U1 M16U1_V240425
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
