Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.1
Wavlink Router Vulnerability: Remote Code Execution via Pr_mode
CVE-2026-3662
Summary
A security weakness in the Wavlink WL-NU516U1 router allows an attacker to take control of the device remotely. This can lead to unauthorized access and potentially malicious changes. Update the router's software as soon as possible to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| wavlink | wl-nu516u1_firmware | m16u1_v240425 | – |
Original title
A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the function usb_p910 of the file /cgi-bin/adm.cgi. Such manipulation of the argument Pr_mode leads to comman...
Original description
A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the function usb_p910 of the file /cgi-bin/adm.cgi. Such manipulation of the argument Pr_mode leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure.
nvd CVSS2.0
5.8
nvd CVSS3.1
4.7
nvd CVSS4.0
5.1
Vulnerability type
CWE-74
Injection
CWE-77
Command Injection
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026