CVE-2025-10964
Severity CVSS v4.0:
MEDIUM
Type:
CWE-74
Injection
Publication date:
25/09/2025
Last modified:
07/10/2025
Description
A weakness has been identified in Wavlink NU516U1. Affected by this vulnerability is the function sub_401B30 of the file /cgi-bin/firewall.cgi. This manipulation of the argument remoteManagementEnabled causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
Impact
Base Score 4.0
5.30
Severity 4.0
MEDIUM
Base Score 3.x
6.30
Severity 3.x
MEDIUM
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:wavlink:wl-nu516u1_firmware:m16u1_v240425:*:*:*:*:*:*:* | ||
| cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
- https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md#poc
- https://vuldb.com/?ctiid_325832=
- https://vuldb.com/?id_325832=
- https://vuldb.com/?submit_652785=
- https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md
- https://github.com/panda666-888/vuls/blob/main/wavlink/nu516u1/websSysFirewall.md#poc



