Submit #758228: wavlink WL-NU516U1-A M16U1_V240425 Command Injectioninfo

Titlewavlink WL-NU516U1-A M16U1_V240425 Command Injection
DescriptionA command injection vulnerability has been discovered in the WAVLINK WL-NU516U1-A USB Printer Server. The vulnerability lies in the `adm.cgi` module. When the `page` parameter is set to `usb_p910`, command execution can be achieved by constructing parameters such as `Pr_mode` .Commands were concatenated using sprintf without validation, thus enabling command execution.
Source⚠️ https://github.com/jinhao118/cve/blob/main/WAVLINK_2.md
User
 allanp0e (UID 94632)
Submission02/14/2026 10:11 (2 months ago)
Moderation03/06/2026 21:29 (20 days later)
StatusAccepted
VulDB entry349551 [Wavlink WL-NU516U1 240425 /cgi-bin/adm.cgi usb_p910 Pr_mode command injection]
Points19

Might our Artificial Intelligence support you?

Check our Alexa App!