Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4466: Command Injection in Comfast CF-AC100

0
Medium
VulnerabilityCVE-2026-4466cvecve-2026-4466
Published: Fri Mar 20 2026 (03/20/2026, 02:02:17 UTC)
Source: CVE Database V5
Vendor/Project: Comfast
Product: CF-AC100

Description

CVE-2026-4466 is a command injection vulnerability in the Comfast CF-AC100 wireless device running firmware version 2. 6. 0. 8. The flaw exists in the /cgi-bin/mbox-config endpoint, specifically when setting the ntp_timezone parameter, allowing remote attackers to execute arbitrary commands. Exploitation does not require user interaction but does require high privileges, limiting attack vectors. The vendor has not responded to the disclosure, and no patches are currently available. The CVSS 4. 0 base score is 5. 1, indicating medium severity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:43:02 UTC

Technical Analysis

CVE-2026-4466 is a medium-severity command injection vulnerability identified in Comfast CF-AC100 devices running firmware version 2.6.0.8. The vulnerability resides in an unspecified function handling the /cgi-bin/mbox-config CGI endpoint, particularly when processing the 'method=SET' and 'section=ntp_timezone' parameters. Improper input validation or sanitization allows an attacker to inject arbitrary OS commands remotely. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), but it requires high privileges (PR:H), suggesting that the attacker must already have elevated access to the device or network. The vulnerability impacts confidentiality, integrity, and availability at a low level, as indicated by the CVSS vector components (VC:L, VI:L, VA:L). The vendor was notified but has not issued a patch or response, and no official remediation is currently available. Public disclosure of the exploit code increases the risk of exploitation, although no active exploitation has been reported. The device is commonly used in wireless networking environments, often in small to medium enterprise or home settings, where attackers could leverage this vulnerability to gain control over the device, manipulate network configurations, or pivot into internal networks.

Potential Impact

Successful exploitation of this vulnerability could allow an attacker with high privileges to execute arbitrary commands on the Comfast CF-AC100 device remotely. This could lead to unauthorized control over the device, enabling attackers to alter network configurations, intercept or redirect traffic, or disrupt network availability. In environments where these devices serve as critical network infrastructure, such compromise could facilitate lateral movement within internal networks, data exfiltration, or persistent access. The medium severity reflects the requirement for elevated privileges, which limits the attack surface but does not eliminate risk, especially in poorly secured or segmented networks. Organizations relying on these devices may face operational disruptions, data breaches, or further compromise of connected systems if the vulnerability is exploited.

Mitigation Recommendations

Given the lack of an official patch or vendor response, organizations should implement compensating controls immediately. These include isolating Comfast CF-AC100 devices on segmented network zones with strict access controls to limit administrative access. Network-level filtering should block unauthorized access to the /cgi-bin/mbox-config endpoint, especially from untrusted networks. Employ strong authentication and change default credentials to reduce the risk of privilege escalation. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. Where possible, replace affected devices with alternative hardware from vendors with active security support. Additionally, organizations should maintain up-to-date network device inventories and conduct regular vulnerability assessments to detect exposure. If custom firmware or community patches become available, evaluate and deploy them cautiously. Finally, establish incident response plans to quickly address potential compromises involving these devices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-19T20:32:14.918Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcafd9e32a4fbe5f174d06

Added to database: 3/20/2026, 2:24:25 AM

Last enriched: 3/27/2026, 7:43:02 PM

Last updated: 5/3/2026, 10:51:33 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses