提交 #652785: Wavlink NU516U1 M16U1_V240425 Command Injection信息

标题Wavlink NU516U1 M16U1_V240425 Command Injection
描述Wavlink NU516U1 M16U1_V240425 were discovered to contain a command injection via the remoteManagementEnabled parameter in the sub_401B30 function of the file firewall.cgi.
来源⚠️ https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
用户
 panda_0x1 (UID 87576)
提交2025-09-11 18時00分 (8 月前)
管理2025-09-25 12時07分 (14 days later)
状态已接受
VulDB条目325832 [Wavlink NU516U1 /cgi-bin/firewall.cgi sub_401B30 remoteManagementEnabled 权限提升]
积分16

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!