A vulnerability was found in Wavlink WL-NU516U1 240425. The impacted element is the function sub_404F68 of the file /cgi-bin/login.cgi. The manipulation of the argument homepage/hostname results in cross site scripting. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure.
https://vuldb.com/?submit.769653
https://vuldb.com/?submit.769652
https://vuldb.com/?ctiid.351073
https://github.com/Litengzheng/vul_db/blob/main/WL-NU516U1/vul_15/README.md
https://github.com/Litengzheng/vul_db/blob/main/WL-NU516U1/vul_14/README.md
Published: 2026-03-15
Base Score: 4
Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N
Severity: Medium
Base Score: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
Severity: Low
Base Score: 5.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: Medium
EPSS: 0.00034