NONE · 0

CVE-2026-41924

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the makeRequest.cgi binary that allows unauthenticated remote attackers to execute arbitrary sh...

Vulnerability Description

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the makeRequest.cgi binary that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the set_time or StartSniffer functions. Attackers can craft a POST request with specially crafted ampersand-delimited parameters to bypass input sanitization and execute commands with a maximum length of 31 bytes through the date command or channel parameter processing.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-41924?

CVE-2026-41924 is a documented vulnerability. WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the makeRequest.cgi binary that allows unauthenticated remote attackers to execute arbitrary sh...

How severe is CVE-2026-41924?

CVSS scoring is not yet available for CVE-2026-41924. Check NVD for updates.

Is there a patch for CVE-2026-41924?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.