Submit #652785: Wavlink NU516U1 M16U1_V240425 Command Injectioninfo

TitelWavlink NU516U1 M16U1_V240425 Command Injection
BeschreibungWavlink NU516U1 M16U1_V240425 were discovered to contain a command injection via the remoteManagementEnabled parameter in the sub_401B30 function of the file firewall.cgi.
Quelle⚠️ https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
Benutzer
 panda_0x1 (UID 87576)
Einreichung11.09.2025 18:00 (vor 8 Monaten)
Moderieren25.09.2025 12:07 (14 days later)
StatusAkzeptiert
VulDB Eintrag325832 [Wavlink NU516U1 /cgi-bin/firewall.cgi sub_401B30 remoteManagementEnabled erweiterte Rechte]
Punkte16

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!