๐Ÿ” CVE Alert

CVE-2026-8229

MEDIUM 6.3

Wavlink NU516U1 wireless.cgi WifiBasic os command injection

CVSS Score
6.3
EPSS Score
0.8%
EPSS Percentile
75th

A vulnerability was detected in Wavlink NU516U1 240425. The affected element is the function WifiBasic of the file /cgi-bin/wireless.cgi. Performing a manipulation of the argument AuthMethod/EncrypType results in os command injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure.

CWE CWE-78 CWE-77
Vendor wavlink
Product nu516u1
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink nu516u1

Be the first to know when new medium vulnerabilities affecting wavlink nu516u1 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / NU516U1
240425

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362446 vuldb.com: https://vuldb.com/vuln/362446/cti vuldb.com: https://vuldb.com/submit/800734 github.com: https://github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_8/8.md

Credits

๐Ÿ” Ziyue Xie (VulDB User) VulDB CNA Team