| Title | wavlink WL-NU516U1-A M16U1_V240425 Command Injection |
|---|
| Description | A command injection vulnerability has been discovered in the WAVLINK WL-NU516U1-A USB Printer Server. The vulnerability lies in the `adm.cgi` module. When the `page` parameter is set to `usb_p910`, command execution can be achieved by constructing parameters such as `Pr_mode` .Commands were concatenated using sprintf without validation, thus enabling command execution. |
|---|
| Source | ⚠️ https://github.com/jinhao118/cve/blob/main/WAVLINK_2.md |
|---|
| User | allanp0e (UID 94632) |
|---|
| Submission | 02/14/2026 10:11 (2 months ago) |
|---|
| Moderation | 03/06/2026 21:29 (20 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 349551 [Wavlink WL-NU516U1 240425 /cgi-bin/adm.cgi usb_p910 Pr_mode command injection] |
|---|
| Points | 19 |
|---|