Enviar #652785: Wavlink NU516U1 M16U1_V240425 Command Injectioninformación

TítuloWavlink NU516U1 M16U1_V240425 Command Injection
DescripciónWavlink NU516U1 M16U1_V240425 were discovered to contain a command injection via the remoteManagementEnabled parameter in the sub_401B30 function of the file firewall.cgi.
Fuente⚠️ https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
Usuario
 panda_0x1 (UID 87576)
Sumisión2025-09-11 18:00 (hace 8 meses)
Moderación2025-09-25 12:07 (14 days later)
EstadoAceptado
Entrada de VulDB325832 [Wavlink NU516U1 /cgi-bin/firewall.cgi sub_401B30 remoteManagementEnabled escalada de privilegios]
Puntos16

Want to know what is going to be exploited?

We predict KEV entries!