OS Command Injection Vulnerability in Wavlink NU516U1 Wireless Device
CVE-2026-8228
Key Information:
Badges
What is CVE-2026-8228?
A vulnerability has been identified in the Wavlink NU516U1 device within the wireless.cgi file, specifically in the advance function. This vulnerability allows for remote exploitation through OS command injection by manipulating the wlan_conf/Channel/skiplist/ieee_80211h argument. Once exploited, the attacker can potentially execute arbitrary commands on the underlying operating system. This security flaw was disclosed publicly and the vendor was notified beforehand.
Affected Version(s)
NU516U1 240425
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
