Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 10 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Encomfast
Encomfast comfast Cf-ac100 Encomfast comfast Cf-ac100 Firmware |
|
| CPEs | cpe:2.3:h:encomfast:comfast_cf-ac100:-:*:*:*:*:*:*:* cpe:2.3:o:encomfast:comfast_cf-ac100_firmware:2.6.0.8:*:*:*:*:*:*:* |
|
| Vendors & Products |
Encomfast
Encomfast comfast Cf-ac100 Encomfast comfast Cf-ac100 Firmware |
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Comfast
Comfast cf-ac100 |
|
| Vendors & Products |
Comfast
Comfast cf-ac100 |
Mon, 09 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Comfast CF-AC100 2.6.0.8. This affects the function sub_44AC14 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component Request Path Handler. The manipulation results in command injection. The attack may be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Comfast CF-AC100 Request Path mbox-config sub_44AC14 command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-10T16:05:35.790Z
Reserved: 2026-03-08T11:25:38.263Z
Link: CVE-2026-3798
Updated: 2026-03-10T16:05:32.368Z
Status : Analyzed
Published: 2026-03-09T04:16:02.397
Modified: 2026-03-10T18:48:08.583
Link: CVE-2026-3798
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:10:26Z