Логотип exploitDog
bind:CVE-2025-10962
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10962

Количество 3

Количество 3

nvd логотип

CVE-2025-10962

5 месяцев назад

A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-3w9v-r68q-8qm7

5 месяцев назад

A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-16417

5 месяцев назад

Уязвимость функции sub_403198() сценария /cgi-bin/wireless.cgi микропрограммного обеспечения маршрутизатора Wavlink NU516U1, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-10962

A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-3w9v-r68q-8qm7

A vulnerability was identified in Wavlink NU516U1 M16U1_V240425. This impacts the function sub_403198 of the file /cgi-bin/wireless.cgi of the component SetName Page. The manipulation of the argument mac_5g leads to command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-16417

Уязвимость функции sub_403198() сценария /cgi-bin/wireless.cgi микропрограммного обеспечения маршрутизатора Wavlink NU516U1, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу