๐Ÿ” CVE Alert

CVE-2026-8230

MEDIUM 6.3

Wavlink NU516U1 login.cgi sys_login1 os command injection

CVSS Score
6.3
EPSS Score
0.8%
EPSS Percentile
75th

A flaw has been found in Wavlink NU516U1 240425. The impacted element is the function sys_login1 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to os command injection. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure.

CWE CWE-78 CWE-77
Vendor wavlink
Product nu516u1
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for wavlink nu516u1

Be the first to know when new medium vulnerabilities affecting wavlink nu516u1 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Wavlink / NU516U1
240425

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/362447 vuldb.com: https://vuldb.com/vuln/362447/cti vuldb.com: https://vuldb.com/submit/800735 github.com: https://github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_9/9.md

Credits

๐Ÿ” Ziyue Xie (VulDB User) VulDB CNA Team