Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4467: Command Injection in Comfast CF-AC100

0
Medium
VulnerabilityCVE-2026-4467cvecve-2026-4467
Published: Fri Mar 20 2026 (03/20/2026, 02:32:10 UTC)
Source: CVE Database V5
Vendor/Project: Comfast
Product: CF-AC100

Description

CVE-2026-4467 is a command injection vulnerability affecting Comfast CF-AC100 version 2. 6. 0. 8. The flaw exists in the /cgi-bin/mbox-config endpoint, specifically when handling the 'method=SET&section=wireless_device_dissoc' parameter. This vulnerability allows an unauthenticated remote attacker with high privileges to execute arbitrary commands on the device. The vendor has not responded to the disclosure, and no patches are currently available. Although the CVSS score is medium (5. 1), exploitation could lead to partial compromise of device confidentiality, integrity, and availability. No known exploits are currently observed in the wild, but public exploit code exists.

AI-Powered Analysis

AILast updated: 03/20/2026, 03:40:38 UTC

Technical Analysis

CVE-2026-4467 is a remote command injection vulnerability identified in Comfast CF-AC100 wireless access point firmware version 2.6.0.8. The vulnerability resides in an unspecified function accessed via the CGI endpoint /cgi-bin/mbox-config with parameters 'method=SET&section=wireless_device_dissoc'. Improper input validation or sanitization allows attackers to inject arbitrary shell commands, which the device executes with elevated privileges. The attack vector is network-based and does not require user interaction, but it does require high privileges, implying that some form of authentication or elevated access might be necessary to exploit. The vendor was notified early but has not issued any response or patch, leaving the device exposed. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and high privileges required (PR:H). The impact on confidentiality, integrity, and availability is low to limited, but successful exploitation could allow attackers to manipulate device settings, disrupt wireless connectivity, or pivot into internal networks. No known active exploitation has been reported, but public exploit code availability increases risk. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls.

Potential Impact

The primary impact of CVE-2026-4467 is unauthorized remote command execution on Comfast CF-AC100 devices, potentially allowing attackers to alter device configuration, disrupt wireless services, or use the device as a foothold for lateral movement within an internal network. Although the CVSS score is medium, the vulnerability could lead to partial compromise of device confidentiality, integrity, and availability. Organizations relying on these devices for wireless access may experience service outages or data interception if attackers manipulate wireless dissociation settings. The absence of vendor patches increases the risk of exploitation, especially in environments where these devices are exposed to untrusted networks. This vulnerability could be leveraged in targeted attacks against enterprises, service providers, or critical infrastructure using Comfast devices, potentially impacting business continuity and network security.

Mitigation Recommendations

Since no official patch is available, organizations should implement the following mitigations: 1) Restrict network access to the management interface of Comfast CF-AC100 devices by placing them behind firewalls or VLAN segmentation to limit exposure to untrusted networks. 2) Disable or restrict access to the vulnerable CGI endpoint (/cgi-bin/mbox-config) if possible, or apply web application firewall (WAF) rules to detect and block suspicious requests targeting this endpoint. 3) Enforce strong authentication and limit administrative access to trusted personnel only, reducing the risk of privilege escalation. 4) Monitor device logs and network traffic for unusual commands or patterns indicative of exploitation attempts. 5) Consider replacing or upgrading devices to models with vendor-supported firmware that addresses this vulnerability. 6) If feasible, isolate vulnerable devices from critical network segments to minimize impact in case of compromise. 7) Stay alert for vendor updates or community patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-19T20:32:18.439Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bcbde5e32a4fbe5f2545ce

Added to database: 3/20/2026, 3:24:21 AM

Last enriched: 3/20/2026, 3:40:38 AM

Last updated: 3/20/2026, 4:37:16 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses