Impact
A command injection flaw exists in the adm.cgi endpoint of the WiFi Extender WDR201A’s web management interface. The sysCMD functionality fails to sanitize user input for a command‑related parameter, allowing an attacker to execute arbitrary shell commands on the device. This weakness, identified as CWE‑78, could be used to compromise the integrity, confidentiality, and availability of the extender and the network it serves.
Affected Systems
The vulnerability impacts the WiFi Extender WDR201A, hardware version 2.1 running firmware LFMZX28040922V1.02. No other models or firmware versions are listed as affected.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests low current exploitation prevalence. The flaw is not cataloged in the CISA KEV list. The attack vector is inferred to be remote, via the device’s exposed HTTP-based management interface, and would require only unauthenticated or low‑privilege access to the web UI.
OpenCVE Enrichment