إرسال #650641: Wavlink WL-NU516U1 M16U1_V240425 Remote Command Executionالمعلومات

عنوانWavlink WL-NU516U1 M16U1_V240425 Remote Command Execution
الوصفThis vulnerability lies in the firmware, which can be exploited for login CGI requests. Attackers can execute arbitrary system commands on the device through specially crafted HTTP requests, thereby completely controlling the device. After in-depth analysis and verification, it has been confirmed that this vulnerability is highly harmful and can lead to the complete takeover of the device.
المصدر⚠️ https://github.com/swwer7000/iot
المستخدم
 iot-Utopia (UID 89975)
ارسال09/09/2025 08:22 AM (8 أشهر منذ)
الاعتدال21/09/2025 10:30 AM (12 days later)
الحالةتمت الموافقة
إدخال VulDB325131 [Wavlink WL-NU516U1 240425 /cgi-bin/login.cgi sub_4012A0 ipaddr تجاوز الصلاحيات]
النقاط18

Might our Artificial Intelligence support you?

Check our Alexa App!