CVE-2026-2566

Wavlink · WL-NU516U1

A high-severity security vulnerability has been detected in Wavlink WL-NU516U1 devices, affecting firmware versions up to 130 and 260.

Executive summary

Wavlink WL-NU516U1 network devices are vulnerable to a high-severity flaw that could lead to unauthorized access or control of the network hardware.

Vulnerability

The vulnerability in the Wavlink WL-NU516U1 involves a security flaw in the device's firmware. While the specific CWE is not listed, a CVSS score of 7.2 suggests a significant impact, likely related to improper authentication or input handling in the management interface.

Business impact

Compromise of network hardware can lead to traffic interception, unauthorized network access, and disruption of connectivity. Given the CVSS score of 7.2, the risk to business operations is substantial, especially if these devices are used to bridge or manage sensitive network segments.

Remediation

Immediate Action: Apply the latest firmware updates from Wavlink for the WL-NU516U1 model immediately.

Proactive Monitoring: Monitor network logs for unauthorized access to the device's administrative web interface and check for unexpected configuration changes.

Compensating Controls: Disable the web management interface on the WAN side and ensure that any local management is performed over a secure, encrypted connection.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should immediately identify any Wavlink WL-NU516U1 devices within their environment and verify their firmware status. Applying the vendor's security updates is essential to mitigate the risk of unauthorized access to the network infrastructure.