CVE-2025-9149

A vulnerability was determined in Wavlink WL-NU516U1 M16U1_V240425. This impacts the function sub_4032E4 of the file /cgi-bin/wireless.cgi. This manipulation of the argument Guest_ssid causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
References
Link Resource
https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md Exploit Third Party Advisory
https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.320528 Permissions Required VDB Entry
https://vuldb.com/?id.320528 Third Party Advisory VDB Entry
https://vuldb.com/?submit.629181 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*

History

06 Oct 2025, 18:52

Type Values Removed Values Added
First Time Wavlink wl-nu516u1
Wavlink wl-nu516u1 Firmware
Wavlink
CPE cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:*
cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:*
References () https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md - () https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md - Exploit, Third Party Advisory
References () https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc - () https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.320528 - () https://vuldb.com/?ctiid.320528 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.320528 - () https://vuldb.com/?id.320528 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.629181 - () https://vuldb.com/?submit.629181 - Third Party Advisory, VDB Entry

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) Se detectó una vulnerabilidad en Wavlink WL-NU516U1 M16U1_V240425. Esta afecta a la función sub_4032E4 del archivo /cgi-bin/wireless.cgi. Esta manipulación del argumento Guest_ssid provoca la inyección de comandos. El ataque puede ejecutarse en remoto. Se ha hecho público el exploit y puede que sea utilizado.

19 Aug 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 18:15

Updated : 2025-10-06 18:52


NVD link : CVE-2025-9149

Mitre link : CVE-2025-9149

CVE.ORG link : CVE-2025-9149


JSON object : View

Products Affected

wavlink

  • wl-nu516u1_firmware
  • wl-nu516u1
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')