| Summary | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the adm.cgi binary's reboot_time function that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the reboot_time POST parameter. Attackers can send a crafted request with shell metacharacters in the reboot_time parameter when reboot_enabled=1 to achieve remote code execution. |
|---|---|
| Publication Date | May 5, 2026, 5:16 a.m. |
| Registration Date | May 6, 2026, 4:07 a.m. |
| Last Update | May 5, 2026, 5:16 a.m. |