WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the firewall.cgi binary across five request handlers that apply insufficient input validation. Attackers can inject arbitrary shell commands through vulnerable parameters like websURLFilter, websHostFilter, portForward, singlePortForward, and ipportFilter using subshell syntax or unfiltered parameters, with payloads persisting in NVRAM and re-executing on every subsequent firewall.cgi request.
Metrics
Affected Vendors & Products
References
History
Mon, 04 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the firewall.cgi binary across five request handlers that apply insufficient input validation. Attackers can inject arbitrary shell commands through vulnerable parameters like websURLFilter, websHostFilter, portForward, singlePortForward, and ipportFilter using subshell syntax or unfiltered parameters, with payloads persisting in NVRAM and re-executing on every subsequent firewall.cgi request. | |
| Title | WDR201A WiFi Extender OS Command Injection via firewall.cgi | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-04T19:19:26.495Z
Reserved: 2026-04-22T18:50:43.620Z
Link: CVE-2026-41926
No data.
Status : Received
Published: 2026-05-04T20:16:19.450
Modified: 2026-05-04T20:16:19.450
Link: CVE-2026-41926
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:30:08Z