CVE-2026-41923 PUBLISHED

WDR201A WiFi Extender OS Command Injection via internet.cgi

Assigner: VulnCheck
Reserved: 22.04.2026 Published: 04.05.2026 Updated: 04.05.2026

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the internet.cgi binary that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the gateway POST parameter. Attackers can exploit unsanitized parameter concatenation in the set_add_routing function to inject shell commands that are executed via popen() with partial output reflected in the HTTP response.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.3

Product Status

Vendor Shenzhen Yipu Commercial and Trading Co., Ltd
Product WDR201A WiFi Extender
Versions Default: unaffected
  • affected from 0 to 1.02 (incl.)

Credits

  • Matteo Strada finder
  • Daniele Berardinelli finder

References

Problem Types

  • Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78) CWE