A flaw has been found in Wavlink NU516U1 M16U1_V240425. Impacted is the function sub_403010 of the file /cgi-bin/wireless.cgi of the component AddMac Page. This manipulation of the argument macAddr causes command injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md | Exploit Third Party Advisory |
| https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.325826 | Permissions Required VDB Entry |
| https://vuldb.com/?id.325826 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.652768 | Third Party Advisory VDB Entry |
| https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md | Exploit Third Party Advisory |
| https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/AddMac.md#poc | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-09-25 18:15
Updated : 2025-10-07 20:51
NVD link : CVE-2025-10958
Mitre link : CVE-2025-10958
CVE.ORG link : CVE-2025-10958
JSON object : View
Products Affected
wavlink
- wl-nu516u1
- wl-nu516u1_firmware
