No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 11 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wl-nu516u1 |
|
| Vendors & Products |
Wavlink
Wavlink wl-nu516u1 |
Sun, 10 May 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Wavlink NU516U1 240425. This issue affects the function wzdapMesh of the file /cgi-bin/adm.cgi. This manipulation causes os command injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure. | |
| Title | Wavlink NU516U1 adm.cgi wzdapMesh os command injection | |
| Weaknesses | CWE-77 CWE-78 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T17:03:20.576Z
Reserved: 2026-05-09T07:54:49.022Z
Link: CVE-2026-8227
Updated: 2026-05-11T17:03:13.150Z
Status : Undergoing Analysis
Published: 2026-05-10T05:16:12.407
Modified: 2026-05-11T15:07:13.027
Link: CVE-2026-8227
No data.
OpenCVE Enrichment
Updated: 2026-05-10T20:00:05Z