Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the adm.cgi binary's reboot_time function that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the reboot_time POST parameter. Attackers can send a crafted request with shell metacharacters in the reboot_time parameter when reboot_enabled=1 to achieve remote code execution. | |
| Title | WDR201A WiFi Extender OS Command Injection via adm.cgi (reboot_time) | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-04T19:40:39.886Z
Reserved: 2026-04-22T18:50:43.620Z
Link: CVE-2026-41925
Updated: 2026-05-04T19:40:35.775Z
Status : Received
Published: 2026-05-04T20:16:19.300
Modified: 2026-05-04T20:16:19.300
Link: CVE-2026-41925
No data.
OpenCVE Enrichment
Updated: 2026-05-04T20:30:08Z