Medium severity6.3NVD Advisory· Published May 9, 2026· Updated May 13, 2026
CVE-2026-8188
CVE-2026-8188
Description
A vulnerability has been found in Wavlink NU516U1 M16U1_V240425. Affected is the function change_wifi_password of the file /cgi-bin/adm.cgi. The manipulation of the argument wl_channel/wl_Pass/EncrypType leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/wudipjq/my_vuln/blob/main/Wavlink/vuln_1/1.mdnvdExploitThird Party Advisory
- vuldb.com/submit/800727nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/362340nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/362340/ctinvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.