Submit #758227: wavlink WL-NU516U1-A M16U1_V240425 Command Injectioninfo

Titlewavlink WL-NU516U1-A M16U1_V240425 Command Injection
DescriptionA command injection vulnerability has been discovered in the WAVLINK WL-NU516U1-A USB Printer Server. The vulnerability lies in the `adm.cgi` module. When the `page` parameter is set to `ota_new_upgrade`, command execution can be achieved by constructing parameters such as `model` and `brand`.
Source⚠️ https://github.com/jinhao118/cve/blob/main/WAVLINK_1.md
User
 allanp0e (UID 94632)
Submission02/14/2026 10:08 (2 months ago)
Moderation03/06/2026 21:29 (20 days later)
StatusAccepted
VulDB entry349550 [Wavlink WL-NU516U1 240425 /cgi-bin/adm.cgi ota_new_upgrade model command injection]
Points18

Do you need the next level of professionalism?

Upgrade your account now!