Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shenzhen Yuner Yipu
Shenzhen Yuner Yipu wifi Extender Wdr201a |
|
| Vendors & Products |
Shenzhen Yuner Yipu
Shenzhen Yuner Yipu wifi Extender Wdr201a |
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains a stack-based buffer overflow vulnerability in the firewall.cgi and makeRequest.cgi binaries that allows unauthenticated attackers to overwrite the saved return address by sending a POST request with a Content-Length header exceeding 512 bytes. Attackers can exploit insufficient length validation in the fgets() call to achieve arbitrary code execution through return-oriented programming or return-to-libc techniques. | |
| Title | WDR201A WiFi Extender Stack-Based Buffer Overflow via firewall.cgi | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T23:11:50.259Z
Reserved: 2026-04-22T18:50:43.620Z
Link: CVE-2026-41927
Updated: 2026-05-05T14:13:00.089Z
Status : Deferred
Published: 2026-05-04T20:16:19.587
Modified: 2026-05-05T19:47:31.297
Link: CVE-2026-41927
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:22:33Z