Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink wl-nu516u1 Firmware
|
|
| CPEs | cpe:2.3:h:wavlink:wl-nu516u1:-:*:*:*:*:*:*:* cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Wavlink wl-nu516u1 Firmware
|
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wavlink
Wavlink wl-nu516u1 |
|
| Vendors & Products |
Wavlink
Wavlink wl-nu516u1 |
Tue, 17 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in Wavlink WL-NU516U1 up to 20251208. The affected element is the function singlePortForwardDelete of the file /cgi-bin/firewall.cgi. Executing a manipulation of the argument del_flag can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Wavlink WL-NU516U1 firewall.cgi singlePortForwardDelete command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-17T14:16:35.087Z
Reserved: 2026-02-17T06:53:05.788Z
Link: CVE-2026-2615
Updated: 2026-02-17T14:16:29.888Z
Status : Analyzed
Published: 2026-02-17T13:16:17.113
Modified: 2026-02-18T19:36:44.157
Link: CVE-2026-2615
No data.
OpenCVE Enrichment
Updated: 2026-02-18T10:43:57Z