{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10775","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-21T08:30:24.929Z","datePublished":"2025-09-22T01:02:06.557Z","dateUpdated":"2025-09-22T16:12:51.103Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-22T01:02:06.557Z"},"title":"Wavlink WL-NU516U1 login.cgi sub_4012A0 os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"Wavlink","product":"WL-NU516U1","versions":[{"version":"240425","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in Wavlink WL-NU516U1 240425. This vulnerability affects the function sub_4012A0 of the file /cgi-bin/login.cgi. Such manipulation of the argument ipaddr leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Wavlink WL-NU516U1 240425 ist eine Schwachstelle entdeckt worden. Betroffen ist die Funktion sub_4012A0 der Datei /cgi-bin/login.cgi. Durch das Beeinflussen des Arguments ipaddr mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Ein Angriff ist aus der Distanz möglich. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-21T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-21T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-21T10:35:50.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"iot-Utopia (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.325131","name":"VDB-325131 | Wavlink WL-NU516U1 login.cgi sub_4012A0 os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.325131","name":"VDB-325131 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.650641","name":"Submit #650641 | Wavlink WL-NU516U1 M16U1_V240425 Remote Command Execution","tags":["third-party-advisory"]},{"url":"https://github.com/swwer7000/iot","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/swwer7000/iot","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-22T16:12:47.942111Z","id":"CVE-2025-10775","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-22T16:12:51.103Z"}}]}}