| Title | COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection |
|---|
| Description | A command injection vulnerability was discovered in the COMFAST CF-E4 (EC200A) WiFi router with firmware version V2.6.0.1. The issue exists within the processing of the ntp_timezone section via the /cgi-bin/mbox-config endpoint. By sending a crafted POST request with a malicious timestr parameter, an authenticated attacker can bypass input validation and execute arbitrary system commands as root. This occurs because the user-supplied input is directly concatenated into a shell command string. |
|---|
| Source | ⚠️ https://github.com/cha0yang1/COMFAST/blob/main/RCE.md |
|---|
| User | cha0yang (UID 94272) |
|---|
| Submission | 01/30/2026 06:21 (3 months ago) |
|---|
| Moderation | 02/15/2026 10:22 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 346125 [Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr command injection] |
|---|
| Points | 20 |
|---|