Soumettre #652785: Wavlink NU516U1 M16U1_V240425 Command Injectioninformation

TitreWavlink NU516U1 M16U1_V240425 Command Injection
DescriptionWavlink NU516U1 M16U1_V240425 were discovered to contain a command injection via the remoteManagementEnabled parameter in the sub_401B30 function of the file firewall.cgi.
La source⚠️ https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
Utilisateur
 panda_0x1 (UID 87576)
Soumission11/09/2025 18:00 (il y a 8 mois)
Modérer25/09/2025 12:07 (14 days later)
StatutAccepté
Entrée VulDB325832 [Wavlink NU516U1 /cgi-bin/firewall.cgi sub_401B30 remoteManagementEnabled élévation de privilèges]
Points16

Want to know what is going to be exploited?

We predict KEV entries!