High (7.2)

CVE-2026-2615:

CVE-2026-2615

A flaw has been found in Wavlink WL-NU516U1 up to 20251208. The affected element is the function singlePortForwardDelete of the file /cgi-bin/firewall.cgi. Executing a manipulation of the argument del...

Overview

A critical security vulnerability has been identified in the Wavlink WL-NU516U1 wireless range extender. This flaw allows a remote attacker to execute arbitrary commands on the affected device. The vulnerability is present in firmware versions up to and including the release dated December 8, 2025.

Vulnerability Explained

In simple terms, the device’s web management interface contains a flaw in a specific feature used to delete port forwarding rules (singlePortForwardDelete). This feature improperly processes user input. By sending a specially crafted network request containing malicious commands within the del_flag argument, an attacker can “trick” the device into executing those commands on its underlying operating system. This is known as a remote command injection vulnerability.

Potential Impact

The impact of this vulnerability is severe. A successful exploit could allow an unauthenticated, remote attacker to:

  • Gain full control of the affected Wavlink device.
  • Install malicious software or firmware.
  • Intercept or redirect network traffic passing through the device.
  • Use the device as a foothold to launch further attacks on other devices within your home or business network.
  • Cause a denial of service by rendering the device inoperable.

The public availability of an exploit increases the risk, making it likely that attackers will actively scan for and target vulnerable devices.

Remediation and Mitigation Steps

Primary Action: Update Firmware

  1. Check for Updates: Immediately log into your Wavlink WL-NU516U1 web management panel and navigate to the firmware update section.
  2. Apply Patch: Install the latest official firmware version from Wavlink, provided it is dated after December 8, 2025. As the vendor has not yet responded, a patch may not be immediately available. Monitor Wavlink’s official support site for a security update.

Immediate Mitigations (If No Patch Exists):

  • Isolate the Device: If possible, move the range extender to a segregated network segment (like a guest VLAN) to limit potential lateral movement if compromised.
  • Restrict Access: Use your main router’s firewall rules to block all inbound WAN (Internet) access to the management interface of the Wavlink device. It should only be accessed from your trusted local network.
  • Consider Replacement: Given the high severity, public exploit, and lack of vendor response, replacing the device with a model from a vendor with a more responsive security update policy is a prudent long-term consideration.

General Advice: Always ensure devices are not exposed to the public internet unless absolutely necessary, and maintain a regular schedule to check for and apply security updates for all network hardware.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.