| Summary | WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains a stack-based buffer overflow vulnerability in the firewall.cgi and makeRequest.cgi binaries that allows unauthenticated attackers to overwrite the saved return address by sending a POST request with a Content-Length header exceeding 512 bytes. Attackers can exploit insufficient length validation in the fgets() call to achieve arbitrary code execution through return-oriented programming or return-to-libc techniques. |
|---|---|
| Publication Date | May 5, 2026, 5:16 a.m. |
| Registration Date | May 6, 2026, 4:07 a.m. |
| Last Update | May 5, 2026, 5:16 a.m. |