Description
A vulnerability was determined in Comfast CF-AC100 2.6.0.8. Affected is an unknown function of the file /cgi-bin/mbox-config?method=SET&section=update_interface_png. This manipulation causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-20
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Command Execution
Action: Immediate Patch
AI Analysis

Impact

A command injection vulnerability exists in the Comfast CF-AC100 firmware 2.6.0.8, affecting the function exposed via the URL /cgi-bin/mbox-config?method=SET&section=update_interface_png. Overworking this function allows an attacker to inject arbitrary shell commands, enabling remote execution of code on the device. The vulnerability is a classic example of input validation weaknesses, as indicated by the associated CWEs (CWE-74, CWE-77). The impact is the ability for an attacker to compromise confidentiality, integrity, and availability of the affected device and potentially use it as an entry point into the local network.

Affected Systems

Affected systems are Comfast CF-AC100 routers running firmware version 2.6.0.8. No older or newer versions are listed as affected, and no other product variants were identified in the available data.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the absence of an EPSS score or KEV listing suggests the risk is not yet formally quantified in public exploit metrics. The attack vector is remote, exploiting the web‑based configuration interface without needing local access or prior authentication. Because the vulnerability is publicly disclosed, it is possible for attackers to craft malicious requests and trigger command injection with relative ease.

Generated by OpenCVE AI on March 20, 2026 at 05:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or firmware update for the CF-AC100 as soon as it is released.
  • Restrict access to the device’s web management interface to trusted IP ranges or via VPN, so that only authorized personnel can reach /cgi-bin/mbox-config.
  • Monitor the router’s system and network logs for signs of abnormal command executions or unexpected traffic patterns.
  • If no patch is available, consider disabling the affected configuration endpoint or enforcing network segmentation to isolate the device from critical assets.

Generated by OpenCVE AI on March 20, 2026 at 05:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Comfast cf-ac100
Vendors & Products Comfast cf-ac100

Fri, 20 Mar 2026 04:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Comfast CF-AC100 2.6.0.8. Affected is an unknown function of the file /cgi-bin/mbox-config?method=SET&section=update_interface_png. This manipulation causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Title Comfast CF-AC100 mbox-config command injection
First Time appeared Comfast
Comfast cf-ac100 Firmware
Weaknesses CWE-74
CWE-77
CPEs cpe:2.3:o:comfast:cf-ac100_firmware:*:*:*:*:*:*:*:*
Vendors & Products Comfast
Comfast cf-ac100 Firmware
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Comfast Cf-ac100 Cf-ac100 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-20T16:18:52.951Z

Reserved: 2026-03-19T20:32:21.458Z

Link: CVE-2026-4468

cve-icon Vulnrichment

Updated: 2026-03-20T16:16:40.799Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T04:16:50.713

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-4468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T10:37:31Z

Weaknesses