提交 #650641: Wavlink WL-NU516U1 M16U1_V240425 Remote Command Execution信息

标题Wavlink WL-NU516U1 M16U1_V240425 Remote Command Execution
描述This vulnerability lies in the firmware, which can be exploited for login CGI requests. Attackers can execute arbitrary system commands on the device through specially crafted HTTP requests, thereby completely controlling the device. After in-depth analysis and verification, it has been confirmed that this vulnerability is highly harmful and can lead to the complete takeover of the device.
来源⚠️ https://github.com/swwer7000/iot
用户
 iot-Utopia (UID 89975)
提交2025-09-09 08時22分 (8 月前)
管理2025-09-21 10時30分 (12 days later)
状态已接受
VulDB条目325131 [Wavlink WL-NU516U1 240425 /cgi-bin/login.cgi sub_4012A0 ipaddr 权限提升]
积分18

Want to know what is going to be exploited?

We predict KEV entries!