{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2615","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-17T06:53:05.788Z","datePublished":"2026-02-17T13:02:06.390Z","dateUpdated":"2026-02-23T10:13:22.556Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:13:22.556Z"},"title":"Wavlink WL-NU516U1 firewall.cgi singlePortForwardDelete command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Wavlink","product":"WL-NU516U1","versions":[{"version":"20251208","status":"affected"}],"cpes":["cpe:2.3:o:wavlink:wl-nu516u1_firmware:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A flaw has been found in Wavlink WL-NU516U1 up to 20251208. The affected element is the function singlePortForwardDelete of the file /cgi-bin/firewall.cgi. Executing a manipulation of the argument del_flag can lead to command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":7.2,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.2,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":8.3,"vectorString":"AV:N/AC:L/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-17T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-17T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T13:51:54.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"haimianbaobao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346265","name":"VDB-346265 | Wavlink WL-NU516U1 firewall.cgi singlePortForwardDelete command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346265","name":"VDB-346265 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.751047","name":"Submit #751047 | Wavlink NU516U1  V251208 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/singlePortForwardDelete.md","tags":["related"]},{"url":"https://github.com/Wlz1112/Wavlink-NU516U1-V251208-/blob/main/singlePortForwardDelete.md#exp","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-17T14:16:14.718041Z","id":"CVE-2026-2615","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-17T14:16:35.087Z"}}]}}