CVE-2026-30701: n/a
The web interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) contains hardcoded credential disclosure mechanisms (in the form of Server Side Include) within multiple server-side web pages, including login.shtml and settings.shtml. These pages embed server-side execution directives that dynamically retrieve and expose the web administration password from non-volatile memory at runtime.
AI Analysis
Technical Summary
CVE-2026-30701 is a critical security vulnerability identified in the WiFi Extender WDR201A, hardware version 2.1 with firmware LFMZX28040922V1.02. The flaw resides in the device's web interface, specifically within multiple server-side web pages such as login.shtml and settings.shtml. These pages contain Server Side Include (SSI) directives that execute on the server to dynamically retrieve and disclose the web administration password stored in non-volatile memory at runtime. This design flaw effectively hardcodes credential disclosure mechanisms into the device's web interface, allowing any remote attacker to access the admin password without authentication or user interaction. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security weakness that can lead to unauthorized access. The CVSS v3.1 base score is 9.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). This means an attacker can remotely exploit the vulnerability to gain sensitive credentials, potentially leading to full device compromise and denial of service. Although no known exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical threat to any organization deploying this WiFi extender model. The absence of available patches or firmware updates further exacerbates the risk, necessitating immediate defensive measures.
Potential Impact
The impact of CVE-2026-30701 is severe for organizations using the affected WiFi Extender WDR201A devices. By exposing the web administration password remotely without authentication, attackers can gain full administrative control over the device. This control enables them to alter network configurations, intercept or redirect network traffic, deploy malicious firmware, or disrupt network availability, resulting in significant confidentiality and availability breaches. The vulnerability can facilitate lateral movement within internal networks, potentially compromising other connected systems. For enterprises relying on these extenders for extending secure WiFi coverage, this vulnerability undermines network security and trust. The high CVSS score reflects the potential for widespread disruption and data exposure. Additionally, since the vulnerability requires no user interaction and can be exploited remotely, it increases the likelihood of automated attacks and rapid exploitation once publicly disclosed. Organizations without immediate mitigation or device replacement face increased risk of targeted attacks, espionage, or service outages.
Mitigation Recommendations
Given the lack of available patches or firmware updates, organizations should implement immediate and specific mitigation steps: 1) Isolate the affected WiFi Extender devices from untrusted or public networks by placing them behind firewalls or network segmentation controls to restrict remote access to the web interface. 2) Disable remote management features on the device if possible to prevent external access to the vulnerable web pages. 3) Monitor network traffic for unusual access patterns or attempts to retrieve the vulnerable web pages (login.shtml, settings.shtml) that could indicate exploitation attempts. 4) Replace affected devices with models from vendors that provide timely security updates and do not contain hardcoded credential disclosure vulnerabilities. 5) If replacement is not immediately feasible, restrict administrative access to the device to trusted internal IP addresses only. 6) Conduct regular audits of network devices to identify and inventory vulnerable hardware to prioritize remediation. 7) Educate network administrators about this vulnerability to ensure rapid response to any suspicious activity. These targeted actions go beyond generic advice by focusing on access control, monitoring, and device replacement strategies specific to this vulnerability's nature.
Affected Countries
United States, Germany, China, India, United Kingdom, France, Japan, South Korea, Brazil, Australia
CVE-2026-30701: n/a
Description
The web interface of the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) contains hardcoded credential disclosure mechanisms (in the form of Server Side Include) within multiple server-side web pages, including login.shtml and settings.shtml. These pages embed server-side execution directives that dynamically retrieve and expose the web administration password from non-volatile memory at runtime.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-30701 is a critical security vulnerability identified in the WiFi Extender WDR201A, hardware version 2.1 with firmware LFMZX28040922V1.02. The flaw resides in the device's web interface, specifically within multiple server-side web pages such as login.shtml and settings.shtml. These pages contain Server Side Include (SSI) directives that execute on the server to dynamically retrieve and disclose the web administration password stored in non-volatile memory at runtime. This design flaw effectively hardcodes credential disclosure mechanisms into the device's web interface, allowing any remote attacker to access the admin password without authentication or user interaction. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security weakness that can lead to unauthorized access. The CVSS v3.1 base score is 9.1, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and high availability impact (A:H). This means an attacker can remotely exploit the vulnerability to gain sensitive credentials, potentially leading to full device compromise and denial of service. Although no known exploits have been reported in the wild yet, the severity and ease of exploitation make this a critical threat to any organization deploying this WiFi extender model. The absence of available patches or firmware updates further exacerbates the risk, necessitating immediate defensive measures.
Potential Impact
The impact of CVE-2026-30701 is severe for organizations using the affected WiFi Extender WDR201A devices. By exposing the web administration password remotely without authentication, attackers can gain full administrative control over the device. This control enables them to alter network configurations, intercept or redirect network traffic, deploy malicious firmware, or disrupt network availability, resulting in significant confidentiality and availability breaches. The vulnerability can facilitate lateral movement within internal networks, potentially compromising other connected systems. For enterprises relying on these extenders for extending secure WiFi coverage, this vulnerability undermines network security and trust. The high CVSS score reflects the potential for widespread disruption and data exposure. Additionally, since the vulnerability requires no user interaction and can be exploited remotely, it increases the likelihood of automated attacks and rapid exploitation once publicly disclosed. Organizations without immediate mitigation or device replacement face increased risk of targeted attacks, espionage, or service outages.
Mitigation Recommendations
Given the lack of available patches or firmware updates, organizations should implement immediate and specific mitigation steps: 1) Isolate the affected WiFi Extender devices from untrusted or public networks by placing them behind firewalls or network segmentation controls to restrict remote access to the web interface. 2) Disable remote management features on the device if possible to prevent external access to the vulnerable web pages. 3) Monitor network traffic for unusual access patterns or attempts to retrieve the vulnerable web pages (login.shtml, settings.shtml) that could indicate exploitation attempts. 4) Replace affected devices with models from vendors that provide timely security updates and do not contain hardcoded credential disclosure vulnerabilities. 5) If replacement is not immediately feasible, restrict administrative access to the device to trusted internal IP addresses only. 6) Conduct regular audits of network devices to identify and inventory vulnerable hardware to prioritize remediation. 7) Educate network administrators about this vulnerability to ensure rapid response to any suspicious activity. These targeted actions go beyond generic advice by focusing on access control, monitoring, and device replacement strategies specific to this vulnerability's nature.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-03-04T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69bae0bb771bdb1749b563ce
Added to database: 3/18/2026, 5:28:27 PM
Last enriched: 3/26/2026, 12:58:06 AM
Last updated: 5/3/2026, 7:13:30 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.