| Titre | COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection |
|---|
| Description | A command injection vulnerability was discovered in the COMFAST CF-E4 (EC200A) WiFi router with firmware version V2.6.0.1. The issue exists within the processing of the ntp_timezone section via the /cgi-bin/mbox-config endpoint. By sending a crafted POST request with a malicious timestr parameter, an authenticated attacker can bypass input validation and execute arbitrary system commands as root. This occurs because the user-supplied input is directly concatenated into a shell command string. |
|---|
| La source | ⚠️ https://github.com/cha0yang1/COMFAST/blob/main/RCE.md |
|---|
| Utilisateur | cha0yang (UID 94272) |
|---|
| Soumission | 30/01/2026 06:21 (il y a 3 mois) |
|---|
| Modérer | 15/02/2026 10:22 (16 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 346125 [Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr élévation de privilèges] |
|---|
| Points | 20 |
|---|