Impact
A command injection flaw exists in the mbox-config CGI script of the Comfast CF‑E4 router firmware. The vulnerability is triggered by supplying a specially crafted timestr argument to the POST request to /cgi-bin/mbox-config?method=SET§ion=ntp_timezone. An attacker who can reach the device can inject arbitrary shell commands, which can then be executed with the privileges of the web server process. The flaw affects confidentiality, integrity, and availability of the device and any services running on it.
Affected Systems
The vulnerability affects Comfast CF‑E4 routers running firmware 2.6.0.1. The affected component is the HTTP POST Request Handler that processes mbox‑config requests.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity. EPSS is reported as less than 1%, implying a very low probability of exploitation, but a publicly available exploit is known, and the attack can be launched remotely without additional credentials. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote exploitation over the network, as the exposed CGI endpoint accepts unauthenticated HTTP POST requests.
OpenCVE Enrichment