Vulnerability Description
A vulnerability was detected in Comfast CF-AC100 2.6.0.8. This affects the function sub_44AC14 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Request Path Handler. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Comfast | Cf-Ac100 Firmware | 2.6.0.8 |
| Comfast | Cf-Ac100 | - |
Related Weaknesses (CWE)
References
- https://github.com/jinhao118/cve/blob/main/ComFast%20CF-AC100-V2.6.0.8_1.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.349765Permissions RequiredVDB Entry
- https://vuldb.com/?id.349765Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.766443Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3798?
CVE-2026-3798 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A vulnerability was detected in Comfast CF-AC100 2.6.0.8. This affects the function sub_44AC14 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Request Path Handler. Th...
How severe is CVE-2026-3798?
CVE-2026-3798 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3798?
Check the references section above for vendor advisories and patch information. Affected products include: Comfast Cf-Ac100 Firmware, Comfast Cf-Ac100.