CVE-2026-2823

6.3 MEDIUM

📋 TL;DR

This CVE describes a command injection vulnerability in Comfast CF-E7 routers version 2.6.0.9. Attackers can remotely execute arbitrary commands by manipulating the 'timestr' parameter in the web management interface. This affects all users of the vulnerable router version who have the web interface exposed.

💻 Affected Systems

Products:
  • Comfast CF-E7 Router
Versions: 2.6.0.9
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: The web management interface must be accessible for exploitation. Default configurations typically enable this interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing persistent backdoor installation, network traffic interception, lateral movement to connected devices, and bricking of the device.

🟠

Likely Case

Remote code execution leading to router configuration changes, credential theft, DNS hijacking, and use as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if web interface is not internet-facing and proper network segmentation is in place.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via the web interface, making internet-exposed devices immediate targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal hosts could exploit this to gain router control and pivot within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details are available in GitHub repositories. The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider replacing affected devices or implementing strict network controls.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Disable the vulnerable web interface completely if not needed for management

Router-specific configuration command to disable web interface

Restrict Web Interface Access

linux

Limit access to the web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Segment affected routers into isolated network zones with strict firewall rules
  • Monitor all traffic to/from affected routers for unusual patterns or command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or SSH. If version is 2.6.0.9, the device is vulnerable.

Check Version:

curl -s http://router-ip/cgi-bin/version or check web interface admin panel

Verify Fix Applied:

No official fix exists to verify. Workarounds can be verified by testing web interface accessibility and functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /cgi-bin/mbox-config with timestr parameter containing shell metacharacters
  • Failed authentication attempts followed by command injection patterns

Network Indicators:

  • HTTP requests to router IP on port 80/443 containing shell commands in parameters
  • Outbound connections from router to unusual external IPs

SIEM Query:

source="router_logs" AND uri="/cgi-bin/mbox-config" AND (param="timestr" AND value MATCHES "[;&|`$()]+")

🔗 References

📤 Share & Export