Логотип exploitDog
bind:CVE-2025-10964
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10964

Количество 3

Количество 3

nvd логотип

CVE-2025-10964

5 месяцев назад

A weakness has been identified in Wavlink NU516U1. Affected by this vulnerability is the function sub_401B30 of the file /cgi-bin/firewall.cgi. This manipulation of the argument remoteManagementEnabled causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-5mh4-m68f-xf7g

5 месяцев назад

A weakness has been identified in Wavlink NU516U1. Affected by this vulnerability is the function sub_401B30 of the file /cgi-bin/firewall.cgi. This manipulation of the argument remoteManagementEnabled causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
EPSS: Низкий
fstec логотип

BDU:2025-16410

5 месяцев назад

Уязвимость функции sub_401B30 микропрограммного обеспечения маршрутизаторов Wavlink NU516U1, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-10964

A weakness has been identified in Wavlink NU516U1. Affected by this vulnerability is the function sub_401B30 of the file /cgi-bin/firewall.cgi. This manipulation of the argument remoteManagementEnabled causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-5mh4-m68f-xf7g

A weakness has been identified in Wavlink NU516U1. Affected by this vulnerability is the function sub_401B30 of the file /cgi-bin/firewall.cgi. This manipulation of the argument remoteManagementEnabled causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 6.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-16410

Уязвимость функции sub_401B30 микропрограммного обеспечения маршрутизаторов Wavlink NU516U1, позволяющая нарушителю выполнить произвольные команды

CVSS3: 6.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу