Home

Description

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the internet.cgi binary that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the gateway POST parameter. Attackers can exploit unsanitized parameter concatenation in the set_add_routing function to inject shell commands that are executed via popen() with partial output reflected in the HTTP response.

PUBLISHED Reserved 2026-04-22 | Published 2026-05-04 | Updated 2026-05-08 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version
affected

Credits

Matteo Strada finder

Daniele Berardinelli finder

References

mstreet97.github.io/...aching_the_Machine_Where_to_Look.html technical-description exploit

www.made-in-china.com/showroom/yeapook/ product

www.vulncheck.com/...r-os-command-injection-via-internet-cgi third-party-advisory

cve.org (CVE-2026-41923)

nvd.nist.gov (CVE-2026-41923)

Download JSON