Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shenzhen Yuner Yipu
Shenzhen Yuner Yipu wifi Extender Wdr201a |
|
| Vendors & Products |
Shenzhen Yuner Yipu
Shenzhen Yuner Yipu wifi Extender Wdr201a |
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the adm.cgi binary's reboot_time function that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the reboot_time POST parameter. Attackers can send a crafted request with shell metacharacters in the reboot_time parameter when reboot_enabled=1 to achieve remote code execution. | |
| Title | WDR201A WiFi Extender OS Command Injection via adm.cgi (reboot_time) | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T23:11:49.523Z
Reserved: 2026-04-22T18:50:43.620Z
Link: CVE-2026-41925
Updated: 2026-05-04T19:40:35.775Z
Status : Deferred
Published: 2026-05-04T20:16:19.300
Modified: 2026-05-05T19:47:31.297
Link: CVE-2026-41925
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:22:36Z