๐Ÿ” CVE Alert

CVE-2026-8228

MEDIUM 6.3

Wavlink NU516U1 wireless.cgi advance os command injection

CVSS Score
6.3
EPSS Score
0.8%
EPSS Percentile
75th

A security vulnerability has been detected in Wavlink NU516U1 240425. Impacted is the function advance of the file /cgi-bin/wireless.cgi. Such manipulation of the argument wlan_conf/Channel/skiplist/ieee_80211h leads to os command injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure.

CWE CWE-78 CWE-77
Vendor wavlink
Product nu516u1
Published May 10, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink nu516u1

Be the first to know when new medium vulnerabilities affecting wavlink nu516u1 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / NU516U1
240425

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362445 vuldb.com: https://vuldb.com/vuln/362445/cti vuldb.com: https://vuldb.com/submit/800733 github.com: https://github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_7/7.md

Credits

๐Ÿ” Ziyue Xie (VulDB User) VulDB CNA Team