| Titel | COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection |
|---|
| Beschreibung | A command injection vulnerability was discovered in the COMFAST CF-E4 (EC200A) WiFi router with firmware version V2.6.0.1. The issue exists within the processing of the ntp_timezone section via the /cgi-bin/mbox-config endpoint. By sending a crafted POST request with a malicious timestr parameter, an authenticated attacker can bypass input validation and execute arbitrary system commands as root. This occurs because the user-supplied input is directly concatenated into a shell command string. |
|---|
| Quelle | ⚠️ https://github.com/cha0yang1/COMFAST/blob/main/RCE.md |
|---|
| Benutzer | cha0yang (UID 94272) |
|---|
| Einreichung | 30.01.2026 06:21 (vor 3 Monaten) |
|---|
| Moderieren | 15.02.2026 10:22 (16 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 346125 [Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr erweiterte Rechte] |
|---|
| Punkte | 20 |
|---|