CVE-2026-2534

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to remotely execute arbitrary commands on the Comfast CF-N1 router by manipulating a specific setting related to bandwidth. The issue arises when the router's firmware processes this input without proper checks, making it possible for anyone with access to the router's configuration interface to exploit it.

Technical Description

A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function sub_44AC4C of the file /cgi-bin/mbox-config?method=SET&section=ptest_bandwidth. The manipulation of the argument bandwidth leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 16, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago

Vendor

comfast

Product

cf-n1 firmware