WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02)...
Critical severity
Unreviewed
Published
May 4, 2026
to the GitHub Advisory Database
•
Updated May 4, 2026
Description
Published by the National Vulnerability Database
May 4, 2026
Published to the GitHub Advisory Database
May 4, 2026
Last updated
May 4, 2026
WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the internet.cgi binary that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the gateway POST parameter. Attackers can exploit unsanitized parameter concatenation in the set_add_routing function to inject shell commands that are executed via popen() with partial output reflected in the HTTP response.
References