제출 #650641: Wavlink WL-NU516U1 M16U1_V240425 Remote Command Execution정보

제목Wavlink WL-NU516U1 M16U1_V240425 Remote Command Execution
설명This vulnerability lies in the firmware, which can be exploited for login CGI requests. Attackers can execute arbitrary system commands on the device through specially crafted HTTP requests, thereby completely controlling the device. After in-depth analysis and verification, it has been confirmed that this vulnerability is highly harmful and can lead to the complete takeover of the device.
원천⚠️ https://github.com/swwer7000/iot
사용자
 iot-Utopia (UID 89975)
제출2025. 09. 09. AM 08:22 (8 개월 ago)
모더레이션2025. 09. 21. AM 10:30 (12 days later)
상태수락
VulDB 항목325131 [Wavlink WL-NU516U1 240425 /cgi-bin/login.cgi sub_4012A0 ipaddr 권한 상승]
포인트들18

Interested in the pricing of exploits?

See the underground prices here!