| Title | wavlink WL-NU516U1-A M16U1_V240425 Command Injection |
|---|
| Description | A command injection vulnerability has been discovered in the WAVLINK WL-NU516U1-A USB Printer Server. The vulnerability lies in the `adm.cgi` module. When the `page` parameter is set to `ota_new_upgrade`, command execution can be achieved by constructing parameters such as `model` and `brand`. |
|---|
| Source | ⚠️ https://github.com/jinhao118/cve/blob/main/WAVLINK_1.md |
|---|
| User | allanp0e (UID 94632) |
|---|
| Submission | 02/14/2026 10:08 (2 months ago) |
|---|
| Moderation | 03/06/2026 21:29 (20 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 349550 [Wavlink WL-NU516U1 240425 /cgi-bin/adm.cgi ota_new_upgrade model command injection] |
|---|
| Points | 18 |
|---|