CVE-2025-10962: Command Injection in Wavlink NU516U1
A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10962 is a command injection vulnerability identified in the Wavlink NU516U1 router, specifically in firmware version M16U1_V240425. The vulnerability resides in the /cgi-bin/wireless.cgi component, within the SetName page's sub_403198 function. The issue arises from improper sanitization of the 'mac_5g' argument, which an attacker can manipulate to inject arbitrary commands. This vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, which suggests limited privileges but no authentication), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has been contacted but has not responded or provided a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability allows attackers to execute arbitrary commands on the device, potentially leading to full device compromise, network pivoting, data interception, or disruption of network services. Given the router's role in network infrastructure, exploitation could affect connected devices and data confidentiality and availability within the network environment.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Wavlink NU516U1 routers in their network infrastructure. Exploitation could lead to unauthorized command execution on the router, enabling attackers to intercept or manipulate network traffic, deploy malware, or disrupt network availability. This could affect business continuity, data privacy compliance (e.g., GDPR), and operational security. Small and medium enterprises (SMEs) and home office environments using this device are particularly vulnerable due to typically weaker network defenses. The lack of vendor response and patch availability increases exposure time. Additionally, attackers could use compromised routers as footholds for lateral movement within corporate networks or as part of botnets targeting European infrastructure. The medium CVSS score reflects the partial impact on confidentiality, integrity, and availability, but the ease of remote exploitation without user interaction or authentication elevates the threat level.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Wavlink NU516U1 routers running the affected firmware version M16U1_V240425. Until an official patch is released, the following mitigations are recommended: 1) Disable remote management interfaces or restrict access to trusted IP addresses only, minimizing exposure to the vulnerable CGI endpoint. 2) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. 3) Monitor network traffic for unusual command injection patterns or unexpected outbound connections originating from the router. 4) Consider replacing affected devices with models from vendors with active security support if patching is not forthcoming. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit. 6) Regularly update firmware when patches become available and subscribe to vendor or security advisories for timely information. 7) Educate IT staff on recognizing signs of router compromise and establish incident response plans specific to network device breaches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-10962: Command Injection in Wavlink NU516U1
Description
A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10962 is a command injection vulnerability identified in the Wavlink NU516U1 router, specifically in firmware version M16U1_V240425. The vulnerability resides in the /cgi-bin/wireless.cgi component, within the SetName page's sub_403198 function. The issue arises from improper sanitization of the 'mac_5g' argument, which an attacker can manipulate to inject arbitrary commands. This vulnerability is remotely exploitable without requiring user interaction or authentication, making it particularly dangerous. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, which suggests limited privileges but no authentication), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has been contacted but has not responded or provided a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability allows attackers to execute arbitrary commands on the device, potentially leading to full device compromise, network pivoting, data interception, or disruption of network services. Given the router's role in network infrastructure, exploitation could affect connected devices and data confidentiality and availability within the network environment.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Wavlink NU516U1 routers in their network infrastructure. Exploitation could lead to unauthorized command execution on the router, enabling attackers to intercept or manipulate network traffic, deploy malware, or disrupt network availability. This could affect business continuity, data privacy compliance (e.g., GDPR), and operational security. Small and medium enterprises (SMEs) and home office environments using this device are particularly vulnerable due to typically weaker network defenses. The lack of vendor response and patch availability increases exposure time. Additionally, attackers could use compromised routers as footholds for lateral movement within corporate networks or as part of botnets targeting European infrastructure. The medium CVSS score reflects the partial impact on confidentiality, integrity, and availability, but the ease of remote exploitation without user interaction or authentication elevates the threat level.
Mitigation Recommendations
Organizations should immediately inventory their network devices to identify any Wavlink NU516U1 routers running the affected firmware version M16U1_V240425. Until an official patch is released, the following mitigations are recommended: 1) Disable remote management interfaces or restrict access to trusted IP addresses only, minimizing exposure to the vulnerable CGI endpoint. 2) Implement network segmentation to isolate vulnerable devices from critical infrastructure and sensitive data. 3) Monitor network traffic for unusual command injection patterns or unexpected outbound connections originating from the router. 4) Consider replacing affected devices with models from vendors with active security support if patching is not forthcoming. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this exploit. 6) Regularly update firmware when patches become available and subscribe to vendor or security advisories for timely information. 7) Educate IT staff on recognizing signs of router compromise and establish incident response plans specific to network device breaches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T10:06:42.187Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d58ce367e88d0912c2c145
Added to database: 9/25/2025, 6:41:39 PM
Last enriched: 9/25/2025, 6:42:11 PM
Last updated: 9/25/2025, 9:28:06 PM
Views: 5
Related Threats
CVE-2025-10978: Improper Authorization in JeecgBoot
MediumCVE-2025-10977: Improper Authorization in JeecgBoot
LowCVE-2025-10976: Improper Authorization in JeecgBoot
LowCVE-2025-10975: Deserialization in GuanxingLu vlarl
MediumCVE-2025-10974: Deserialization in giantspatula SewKinect
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.