Vulnerability Description
A vulnerability was found in Wavlink NU516U1 M16U1_V240425. Affected by this vulnerability is the function wzdrepeater of the file /cgi-bin/adm.cgi. The manipulation of the argument wlan_bssid/sel_Automode/sel_EncrypTyp results in os command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wavlink | Wl-Nu516U1 Firmware | m16u1_v240425 |
| Wavlink | Wl-Nu516U1 | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_2/2.mdExploitThird Party Advisory
- https://vuldb.com/submit/800728Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362341Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/362341/ctiPermissions RequiredVDB Entry
FAQ
What is CVE-2026-8189?
CVE-2026-8189 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was found in Wavlink NU516U1 M16U1_V240425. Affected by this vulnerability is the function wzdrepeater of the file /cgi-bin/adm.cgi. The manipulation of the argument wlan_bssid/sel_Aut...
How severe is CVE-2026-8189?
CVE-2026-8189 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8189?
Check the references section above for vendor advisories and patch information. Affected products include: Wavlink Wl-Nu516U1 Firmware, Wavlink Wl-Nu516U1.