CVE-2026-41922 - WDR201A WiFi Extender OS Command Injection via wireless.cgi
CVE ID :CVE-2026-41922 Published : May 4, 2026, 7:04 p.m. | 1 hour, 6 minutes ago Description :WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the wireless.cgi binary that allow unauthenticated remote attackers to execute arbitrary shell
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Podman rootless containers and the Copy Fail exploit
- [CYBER] Weaver E-cology critical bug exploited in attacks since March
- [CYBER] CVE-2026-7776 - Boundary Workers Vulnerable to Denial of Service During TLS Handshake
- [CYBER] MOVEit automation flaws could enable full system compromise
- [CYBER] CVE-2026-7779 - Open5GS authentication-subscription Endpoint nudr-handler.c udm_nudr_dr_handle_subscription_authentication denial of service
- [CYBER] CVE-2026-42238 - Unauthenticated Remote Code Execution via Backup Restore in nginx-ui