| Titel | Comfast CF-N1-S V2.6.0.1 Authenticated Command Injection |
|---|
| Beschreibung | An authenticated command injection vulnerability was identified in the COMFAST CF-N1-S V2 router. An attacker with a valid session can send a crafted HTTP POST request to achieve arbitrary command execution on the target device. The issue can be triggered via the following endpoint:
`POST /cgi-bin/mbox-config?method=SET§ion=ping_config HTTP/1.1`
Successful exploitation requires the attacker to be authenticated and supply a valid session cookie. |
|---|
| Quelle | ⚠️ https://github.com/Blackhole23-Lab/-/blob/main/Comfast-CF-N1-S-Router-VUDB.md |
|---|
| Benutzer | xxyNB (UID 94808) |
|---|
| Einreichung | 02.04.2026 04:25 (vor 22 Tagen) |
|---|
| Moderieren | 21.04.2026 16:43 (20 days later) |
|---|
| Status | Akzeptiert |
|---|
| VulDB Eintrag | 358492 [Comfast CF-N1-S 2.6.0.1 Endpoint mbox-config?method=SET§ion=ping_config destination erweiterte Rechte] |
|---|
| Punkte | 20 |
|---|