Submit #749196: COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injectioninfo

TitleCOMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection
DescriptionA command injection vulnerability was discovered in the COMFAST CF-E4 (EC200A) WiFi router with firmware version V2.6.0.1. The issue exists within the processing of the ntp_timezone section via the /cgi-bin/mbox-config endpoint. By sending a crafted POST request with a malicious timestr parameter, an authenticated attacker can bypass input validation and execute arbitrary system commands as root. This occurs because the user-supplied input is directly concatenated into a shell command string.
Source⚠️ https://github.com/cha0yang1/COMFAST/blob/main/RCE.md
User
 cha0yang (UID 94272)
Submission01/30/2026 06:21 (3 months ago)
Moderation02/15/2026 10:22 (16 days later)
StatusAccepted
VulDB entry346125 [Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr command injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!