Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2537: Command Injection in Comfast CF-E4

0
Medium
VulnerabilityCVE-2026-2537cvecve-2026-2537
Published: Mon Feb 16 2026 (02/16/2026, 05:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Comfast
Product: CF-E4

Description

A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the file /cgi-bin/mbox-config?method=SET&section=ntp_timezone of the component HTTP POST Request Handler. Such manipulation of the argument timestr leads to command injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:18:17 UTC

Technical Analysis

CVE-2026-2537 is a command injection vulnerability identified in Comfast CF-E4 firmware version 2.6.0.1. The vulnerability resides in the HTTP POST request handler for the /cgi-bin/mbox-config endpoint, specifically when handling the 'timestr' argument within the 'ntp_timezone' section. Improper input validation allows an attacker to inject arbitrary OS commands through this parameter. The attack vector is remote and network-based, requiring the attacker to have high-level privileges (authentication) on the device. The vulnerability does not require user interaction and affects the confidentiality, integrity, and availability of the device by enabling arbitrary command execution. Despite the vendor being notified early, no patch or response has been provided, and public exploit code is available, increasing the likelihood of exploitation. The CVSS v4.0 score is 5.1 (medium), reflecting the need for authentication and limited scope of impact. The device is typically used in networking environments, and exploitation could lead to device compromise, network disruption, or pivoting within internal networks.

Potential Impact

The primary impact of CVE-2026-2537 is the potential for attackers with authenticated access to execute arbitrary commands on Comfast CF-E4 devices remotely. This can lead to full device compromise, allowing attackers to alter configurations, disrupt network services, or use the device as a foothold for further attacks within an organization's network. Confidentiality may be breached if sensitive information stored or transmitted by the device is accessed or exfiltrated. Integrity is at risk as attackers can modify device settings or firmware. Availability could be impacted if the device is rendered inoperable or used in denial-of-service attacks. The requirement for authentication limits exposure to external unauthenticated attackers but does not eliminate risk, especially in environments with weak or default credentials. The lack of vendor response and patch availability increases the window of vulnerability, making timely mitigation critical for organizations relying on these devices.

Mitigation Recommendations

Organizations should immediately audit Comfast CF-E4 devices to identify those running version 2.6.0.1 and restrict administrative access to trusted personnel and networks only. Change all default or weak credentials to strong, unique passwords to reduce the risk of unauthorized authentication. Implement network segmentation to isolate management interfaces from general user networks and the internet. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. If possible, disable or restrict access to the vulnerable /cgi-bin/mbox-config endpoint or the affected functionality until a vendor patch is released. Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability or related exploit attempts. Maintain an inventory of affected devices and stay alert for vendor updates or community-developed patches. Consider replacing or upgrading devices if no vendor support is forthcoming.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T09:22:17.332Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992b36bbda29fb02f4bb440

Added to database: 2/16/2026, 6:04:27 AM

Last enriched: 2/23/2026, 9:18:17 PM

Last updated: 4/6/2026, 6:49:08 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses