提交 #749196: COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection信息

标题COMFAST CF-E4 (EC200A) 2.6.0.1 Command Injection
描述A command injection vulnerability was discovered in the COMFAST CF-E4 (EC200A) WiFi router with firmware version V2.6.0.1. The issue exists within the processing of the ntp_timezone section via the /cgi-bin/mbox-config endpoint. By sending a crafted POST request with a malicious timestr parameter, an authenticated attacker can bypass input validation and execute arbitrary system commands as root. This occurs because the user-supplied input is directly concatenated into a shell command string.
来源⚠️ https://github.com/cha0yang1/COMFAST/blob/main/RCE.md
用户
 cha0yang (UID 94272)
提交2026-01-30 06時21分 (3 月前)
管理2026-02-15 10時22分 (16 days later)
状态已接受
VulDB条目346125 [Comfast CF-E4 2.6.0.1 HTTP POST Request mbox-config?method=SET§ion=ntp_timezone timestr 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!