๐Ÿ” CVE Alert

CVE-2026-8189

MEDIUM 6.3

Wavlink NU516U1 adm.cgi wzdrepeater os command injection

CVSS Score
6.3
EPSS Score
0.8%
EPSS Percentile
75th

A vulnerability was found in Wavlink NU516U1 M16U1_V240425. Affected by this vulnerability is the function wzdrepeater of the file /cgi-bin/adm.cgi. The manipulation of the argument wlan_bssid/sel_Automode/sel_EncrypTyp results in os command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.

CWE CWE-78 CWE-77
Vendor wavlink
Product nu516u1
Published May 9, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink nu516u1

Be the first to know when new medium vulnerabilities affecting wavlink nu516u1 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / NU516U1
M16U1_V240425

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362341 vuldb.com: https://vuldb.com/vuln/362341/cti vuldb.com: https://vuldb.com/submit/800728 github.com: https://github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_2/2.md

Credits

๐Ÿ” Ziyue Xie (VulDB User) VulDB CNA Team