Skip to main content

CVE-2025-10960: Command Injection in Wavlink NU516U1

Medium
VulnerabilityCVE-2025-10960cvecve-2025-10960
Published: Thu Sep 25 2025 (09/25/2025, 18:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: NU516U1

Description

A vulnerability was found in Wavlink NU516U1 M16U1_V240425. The impacted element is the function sub_402D1C of the file /cgi-bin/wireless.cgi of the component DeleteMac Page. Performing manipulation of the argument delete_list results in command injection. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/25/2025, 18:14:36 UTC

Technical Analysis

CVE-2025-10960 is a command injection vulnerability identified in the Wavlink NU516U1 router, specifically in the M16U1_V240425 firmware version. The vulnerability exists in the function sub_402D1C within the /cgi-bin/wireless.cgi component, which handles the DeleteMac Page functionality. The flaw arises from improper sanitization or validation of the 'delete_list' argument, allowing an attacker to inject arbitrary commands that the system executes. This vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The public availability of an exploit increases the risk of exploitation. The vendor has been notified but has not responded or issued a patch, leaving affected devices exposed. The CVSS 4.0 base score is 5.3, reflecting a medium severity level, with a vector indicating network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vulnerability could allow attackers to execute arbitrary commands on the device, potentially leading to device compromise, network pivoting, or disruption of network services.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Wavlink NU516U1 routers in their network infrastructure. Successful exploitation could allow attackers to gain control over the router, leading to interception or manipulation of network traffic, unauthorized access to internal resources, or disruption of connectivity. This could impact confidentiality by exposing sensitive data, integrity by altering network configurations or data flows, and availability by causing denial of service. Given the router's role as a network gateway, compromise could facilitate lateral movement within corporate networks or serve as a foothold for further attacks. The lack of vendor response and patch availability increases the window of exposure. Organizations with remote or distributed offices relying on these devices are particularly vulnerable. Additionally, the public exploit availability raises the likelihood of opportunistic attacks targeting unpatched devices across Europe.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify any Wavlink NU516U1 routers running the vulnerable firmware version M16U1_V240425. Until a vendor patch is available, network administrators should implement compensating controls such as restricting access to the router's management interface to trusted IP addresses only, preferably via VPN or internal network segments. Disabling remote management features and the affected DeleteMac functionality, if possible, can reduce attack surface. Network-level protections like intrusion detection/prevention systems (IDS/IPS) should be configured to detect and block suspicious command injection patterns targeting the /cgi-bin/wireless.cgi endpoint. Regular monitoring of router logs for unusual commands or access attempts is advised. Organizations should engage with Wavlink support channels to seek updates or patches and consider replacing vulnerable devices if no remediation is forthcoming. Additionally, segmenting critical network assets behind more secure firewalls can limit potential damage from compromised routers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T10:06:36.173Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d5866d384303d4316bb4b7

Added to database: 9/25/2025, 6:14:05 PM

Last enriched: 9/25/2025, 6:14:36 PM

Last updated: 9/25/2025, 7:30:16 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats