Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30702: n/a

0
Critical
VulnerabilityCVE-2026-30702cvecve-2026-30702
Published: Wed Mar 18 2026 (03/18/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:58:21 UTC

Technical Analysis

The vulnerability identified as CVE-2026-30702 affects the WiFi Extender WDR201A hardware version 2.1 running firmware LFMZX28040922V1.02. The core issue is a broken authentication mechanism in the device's web management interface. Specifically, the login page does not properly enforce session validation, which means that an attacker can bypass the authentication process by directly accessing restricted web application endpoints through forced browsing techniques. This allows unauthorized users to interact with the device’s management functions without needing valid credentials. The vulnerability is classified under CWE-285 (Improper Authorization). The CVSS v3.1 base score is 9.8 (critical), with attack vector network (AV:N), attack complexity low (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope unchanged (S:U), and high impact on confidentiality (C:H), integrity (I:H), and availability (A:H). This means the attack can be performed remotely over the network without any authentication or user interaction, and it can lead to full compromise of the device’s management capabilities. No patches or firmware updates are currently listed, and no known exploits have been reported in the wild yet. However, the vulnerability’s nature and severity suggest it could be exploited to gain control over the device, alter configurations, disrupt network connectivity, or pivot into internal networks.

Potential Impact

The impact of CVE-2026-30702 is severe for organizations using the affected WiFi Extender WDR201A devices. Unauthorized access to the management interface can lead to full compromise of the device, including configuration changes, disabling security features, or injecting malicious settings. This could result in network outages, interception of network traffic, or use of the device as a foothold for lateral movement within the network. Confidential data passing through or managed by the device could be exposed or manipulated. The vulnerability’s ease of exploitation (no authentication or user interaction required) and network accessibility make it a high-risk vector for attackers. Enterprises, service providers, and critical infrastructure relying on these extenders may face operational disruptions and data breaches. Additionally, attackers could leverage compromised devices to launch further attacks or create persistent backdoors. The lack of available patches increases the urgency for mitigation and risk management.

Mitigation Recommendations

To mitigate CVE-2026-30702, organizations should immediately restrict access to the WiFi Extender’s web management interface by implementing network segmentation and firewall rules that limit access to trusted administrative hosts only. Disable remote management if not required. Monitor network traffic for unusual access patterns to the device’s management endpoints. If possible, replace affected devices with models that do not exhibit this vulnerability or have confirmed patches. Regularly check vendor communications for firmware updates addressing this issue and apply them promptly once available. Employ strong network access controls and consider deploying intrusion detection/prevention systems to detect forced browsing attempts. Additionally, conduct security audits of network devices to identify and remediate similar authentication weaknesses. Document and enforce strict administrative policies for device management to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bae0bb771bdb1749b563d2

Added to database: 3/18/2026, 5:28:27 PM

Last enriched: 3/26/2026, 12:58:21 AM

Last updated: 5/2/2026, 5:22:31 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses