Skip to main content

CVE-2025-10963: Command Injection in Wavlink NU516U1

Medium
VulnerabilityCVE-2025-10963cvecve-2025-10963
Published: Thu Sep 25 2025 (09/25/2025, 19:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Wavlink
Product: NU516U1

Description

A security flaw has been discovered in Wavlink NU516U1 M16U1_V240425. Affected is the function sub_4016F0 of the file /cgi-bin/firewall.cgi. The manipulation of the argument del_flag results in command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/25/2025, 19:34:15 UTC

Technical Analysis

CVE-2025-10963 is a command injection vulnerability identified in the Wavlink NU516U1 router, specifically in the firmware version M16U1_V240425. The flaw exists in the function sub_4016F0 within the /cgi-bin/firewall.cgi script. An attacker can manipulate the 'del_flag' argument to inject arbitrary commands, which the system executes. This vulnerability is remotely exploitable without requiring user interaction or prior authentication, making it particularly dangerous. The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The vendor, Wavlink, was notified early but has not responded or released a patch, and no known exploits are currently observed in the wild. The public disclosure and availability of exploit details increase the risk of exploitation, especially on unpatched devices. The vulnerability affects a widely used consumer and small business router model, which typically manages network traffic and firewall rules, making successful exploitation potentially impactful for network security and device control.

Potential Impact

For European organizations, especially small and medium enterprises (SMEs) and home office users relying on Wavlink NU516U1 routers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on the router, potentially leading to network compromise, interception or redirection of traffic, and disruption of network services. This could facilitate further attacks such as lateral movement, data exfiltration, or launching attacks against internal systems. The lack of vendor response and patch availability increases exposure time. Given the router’s role in perimeter defense, exploitation could undermine network integrity and availability, affecting business continuity. Critical infrastructure operators using these devices in less secure environments may also be at risk. The medium severity rating suggests moderate impact, but the ease of remote exploitation without authentication elevates the threat level. Organizations with limited IT security resources may be particularly vulnerable to exploitation and subsequent damage.

Mitigation Recommendations

Organizations should immediately identify and inventory all Wavlink NU516U1 devices running firmware version M16U1_V240425. Until a vendor patch is available, mitigation should focus on network-level controls: restrict remote access to the router’s management interface by implementing IP whitelisting or VPN access only; disable remote management features if not required; monitor network traffic for unusual activity targeting /cgi-bin/firewall.cgi or suspicious command injection patterns; employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts; segment networks to limit the impact of a compromised router; and consider replacing vulnerable devices with models from vendors with active security support. Additionally, organizations should maintain rigorous backup and recovery procedures to restore network devices if compromised. Regularly check for vendor updates or community patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T10:06:45.121Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d5985b1b02452dbc516200

Added to database: 9/25/2025, 7:30:35 PM

Last enriched: 9/25/2025, 7:34:15 PM

Last updated: 10/2/2025, 12:11:00 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats