إرسال #795203: Comfast CF-N1-S V2.6.0.1 Authenticated Command Injectionالمعلومات

عنوانComfast CF-N1-S V2.6.0.1 Authenticated Command Injection
الوصفAn authenticated command injection vulnerability was identified in the COMFAST CF-N1-S V2 router. An attacker with a valid session can send a crafted HTTP POST request to achieve arbitrary command execution on the target device. The issue can be triggered via the following endpoint: `POST /cgi-bin/mbox-config?method=SET&section=ping_config HTTP/1.1` Successful exploitation requires the attacker to be authenticated and supply a valid session cookie.
المصدر⚠️ https://github.com/Blackhole23-Lab/-/blob/main/Comfast-CF-N1-S-Router-VUDB.md
المستخدم
 xxyNB (UID 94808)
ارسال02/04/2026 04:25 AM (22 أيام منذ)
الاعتدال21/04/2026 04:43 PM (20 days later)
الحالةتمت الموافقة
إدخال VulDB358492 [Comfast CF-N1-S 2.6.0.1 Endpoint mbox-config?method=SET§ion=ping_config destination تجاوز الصلاحيات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!