CVE-2026-41926 - WDR201A WiFi Extender OS Command Injection via firewall.cgi
CVE ID :CVE-2026-41926 Published : May 4, 2026, 7:17 p.m. | 52 minutes ago Description :WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the firewall.cgi binary across five request handlers that apply insufficient input validation. Attack
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Podman rootless containers and the Copy Fail exploit
- [CYBER] Weaver E-cology critical bug exploited in attacks since March
- [CYBER] CVE-2026-7776 - Boundary Workers Vulnerable to Denial of Service During TLS Handshake
- [CYBER] MOVEit automation flaws could enable full system compromise
- [CYBER] CVE-2026-7779 - Open5GS authentication-subscription Endpoint nudr-handler.c udm_nudr_dr_handle_subscription_authentication denial of service
- [CYBER] CVE-2026-42238 - Unauthenticated Remote Code Execution via Backup Restore in nginx-ui