CVE-2026-2566
Wavlink · WL-NU516U1
A high-severity security vulnerability has been detected in Wavlink WL-NU516U1 devices, affecting firmware versions up to 130 and 260.
Executive summary
Wavlink WL-NU516U1 network devices are vulnerable to a high-severity flaw that could lead to unauthorized access or control of the network hardware.
Vulnerability
The vulnerability in the Wavlink WL-NU516U1 involves a security flaw in the device's firmware. While the specific CWE is not listed, a CVSS score of 7.2 suggests a significant impact, likely related to improper authentication or input handling in the management interface.
Business impact
Compromise of network hardware can lead to traffic interception, unauthorized network access, and disruption of connectivity. Given the CVSS score of 7.2, the risk to business operations is substantial, especially if these devices are used to bridge or manage sensitive network segments.
Remediation
Immediate Action: Apply the latest firmware updates from Wavlink for the WL-NU516U1 model immediately.
Proactive Monitoring: Monitor network logs for unauthorized access to the device's administrative web interface and check for unexpected configuration changes.
Compensating Controls: Disable the web management interface on the WAN side and ensure that any local management is performed over a secure, encrypted connection.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should immediately identify any Wavlink WL-NU516U1 devices within their environment and verify their firmware status. Applying the vendor's security updates is essential to mitigate the risk of unauthorized access to the network infrastructure.