CVE-2025-10959

A vulnerability has been found in Wavlink NU516U1 M16U1_V240425. The affected element is the function sub_401778 of the file /cgi-bin/firewall.cgi. Such manipulation of the argument dmz_flag leads to command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

07 Oct 2025, 20:51

Type Values Removed Values Added
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
First Time Wavlink wl-nu516u1
Wavlink wl-nu516u1 Firmware
Wavlink
References () https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DMZ.md - () https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DMZ.md - Exploit, Third Party Advisory
References () https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DMZ.md#poc - () https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/DMZ.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.325827 - () https://vuldb.com/?ctiid.325827 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.325827 - () https://vuldb.com/?id.325827 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.652769 - () https://vuldb.com/?submit.652769 - Third Party Advisory, VDB Entry

25 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-25 18:15

Updated : 2025-10-07 20:51


NVD link : CVE-2025-10959

Mitre link : CVE-2025-10959

CVE.ORG link : CVE-2025-10959


JSON object : View

Products Affected

wavlink

  • wl-nu516u1_firmware
  • wl-nu516u1
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')