CVE-2026-2823
Published: 20 February 2026
Summary
CVE-2026-2823 is a medium-severity Injection (CWE-74) vulnerability in Comfast Cf-E7 Firmware. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in the authenticated web management endpoint (/cgi-bin/mbox-config ntp_timezone) on a network device directly enables remote exploitation of a public-facing application (T1190) and arbitrary command execution through the device's CLI/shell (T1059.008).
NVD Description
A vulnerability was detected in Comfast CF-E7 2.6.0.9. The impacted element is the function sub_41ACCC of the file /cgi-bin/mbox-config?method=SET§ion=ntp_timezone of the component webmggnt. Performing a manipulation of the argument timestr results in command injection. The attack is possible to be…
more
carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-2823 is a command injection vulnerability in the Comfast CF-E7 router running firmware version 2.6.0.9. The issue affects the sub_41ACCC function within the /cgi-bin/mbox-config?method=SET§ion=ntp_timezone endpoint of the webmggnt component. By manipulating the timestr argument, an attacker can inject arbitrary commands, as classified under CWE-74 and CWE-77. The vulnerability carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), indicating medium severity.
The vulnerability can be exploited remotely over the network by an attacker with low privileges, such as an authenticated user on the device. No user interaction is required, and the attack complexity is low. Successful exploitation allows limited impacts, including partial disclosure of sensitive information, minor modification of data or configuration, and partial denial of service, depending on the injected commands.
VulDB advisories detail the issue and note that the vendor was contacted early but provided no response or patch. An exploit is publicly available on GitHub, increasing the risk of active use. Security practitioners should isolate affected devices, restrict access to the web management interface, and monitor for anomalous NTP timezone configuration attempts until firmware updates are available.
Details
- CWE(s)