No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Comfast
Comfast cf-e4 |
|
| Vendors & Products |
Comfast
Comfast cf-e4 |
Mon, 16 Feb 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=ntp_timezone of the component HTTP POST Request Handler. Such manipulation of the argument timestr leads to command injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Comfast CF-E4 HTTP POST Request mbox-config command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-17T17:04:23.381Z
Reserved: 2026-02-15T09:22:17.332Z
Link: CVE-2026-2537
Updated: 2026-02-17T17:04:18.663Z
Status : Received
Published: 2026-02-16T06:16:22.320
Modified: 2026-02-16T06:16:22.320
Link: CVE-2026-2537
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:49:59Z