PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-8188 Vuldb CVE debrief

CVE-2026-8188 describes a remotely reachable OS command injection in Wavlink NU516U1 M16U1_V240425. The reported issue is in /cgi-bin/adm.cgi’s change_wifi_password function, where wl_channel, wl_Pass, and EncrypType inputs are implicated. Although the published CVSS score is low, the combination of remote reachability and public exploit disclosure makes exposed administration interfaces worth prompt review.

Vendor
Vuldb
Product
Unknown
CVSS
LOW 2.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-09
Original CVE updated
2026-05-09
Advisory published
2026-05-09
Advisory updated
2026-05-09

Who should care

Organizations running Wavlink NU516U1 M16U1_V240425, especially where the web admin interface is reachable from untrusted or broadly reachable networks. Security teams responsible for small-office, branch, or remote-edge devices should care because the affected CGI endpoint is part of device administration.

Technical summary

The supplied source material reports an OS command injection in the change_wifi_password handler within /cgi-bin/adm.cgi on Wavlink NU516U1 M16U1_V240425. The vulnerable handling involves wl_channel, wl_Pass, and EncrypType parameters. NVD’s record shows a CVSS v4 vector with network access and low attack complexity, and the weakness mapping includes CWE-77 and CWE-78. The source also states that an exploit has been publicly disclosed.

Defensive priority

Medium; increase to High for any internet-exposed or remotely reachable admin interface.

Recommended defensive actions

  • Restrict access to the device administration interface to trusted management networks only.
  • Review whether the affected Wavlink NU516U1 M16U1_V240425 firmware is deployed anywhere in your environment.
  • Apply vendor guidance or firmware updates if and when they are available for the affected model and version.
  • Monitor for and block unusual requests to /cgi-bin/adm.cgi, especially around password-change workflows.
  • If exposure cannot be reduced immediately, place the device behind additional network controls such as VPN, ACLs, or management segmentation.
  • Inventory similar Wavlink devices and other CGI-based admin portals for comparable command-injection risk.

Evidence notes

The authoritative CVE and NVD links identify CVE-2026-8188 and show the record was received by NVD on 2026-05-09. The NVD metadata references VulDB-supplied materials, including a GitHub write-up and VulDB submission/detail pages, for the affected Wavlink NU516U1 M16U1_V240425 firmware and the /cgi-bin/adm.cgi change_wifi_password command-injection issue. The supplied corpus does not include a vendor patch advisory or KEV entry.

Official resources

Publicly disclosed; the supplied description states the exploit has been disclosed and that the vendor was contacted early.