CVE-2026-30702
Received Received - Intake
Authentication Bypass in WDR201A WiFi Extender Web Interface

Publication date: 2026-03-18

Last updated on: 2026-03-23

Assigner: MITRE

Description
The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-23
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
shenzhen_yuner_yipu_trading_co_ltd wdr201a From 2.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'The vulnerability in the WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) is an authentication bypass in its web management interface. The login page does not properly enforce session validation, which means attackers can bypass the login process by directly accessing restricted web application endpoints through forced browsing without needing valid authentication cookies.'}, {'type': 'paragraph', 'content': "This allows attackers to gain full administrative access to the device's web interface without logging in."}] [2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability allows an attacker to bypass authentication and gain full administrative access to the WiFi extender's management interface. With this access, the attacker can perform actions such as changing device settings, updating firmware, and potentially compromising the network the device is connected to."}, {'type': 'paragraph', 'content': 'Such unauthorized control can lead to network disruption, unauthorized data access, or the device being used as a foothold for further attacks within the network.'}] [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to access restricted web management interface endpoints of the WiFi Extender WDR201A without authentication cookies, effectively performing forced browsing to bypass the login page.'}, {'type': 'paragraph', 'content': "One practical approach is to send HTTP requests directly to admin or restricted URLs on the device's web interface and observe if access is granted without proper authentication."}, {'type': 'paragraph', 'content': 'Additionally, testing for the presence of hardcoded credentials or unauthorized access can be done by inspecting the web interface source code or by attempting to log in using known default credentials.'}, {'type': 'paragraph', 'content': "Commands that can be used include curl or wget to send HTTP requests to the device's management URLs, for example:"}, {'type': 'list_item', 'content': 'curl -I http://<device-ip>/admin or other restricted endpoints to check for HTTP status codes indicating access without authentication.'}, {'type': 'list_item', 'content': 'curl http://<device-ip>/admin -b "" to simulate requests without cookies and see if access is granted.'}, {'type': 'list_item', 'content': 'Inspecting the web page source code using a browser or curl to look for hardcoded credentials or SSI directives.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': "Immediate mitigation steps include restricting access to the device's web management interface by network segmentation or firewall rules to prevent unauthorized forced browsing."}, {'type': 'paragraph', 'content': 'Disabling remote management or limiting it to trusted IP addresses can reduce exposure.'}, {'type': 'paragraph', 'content': 'If possible, update the device firmware to a version that addresses the authentication bypass vulnerability.'}, {'type': 'paragraph', 'content': 'Change any default or hardcoded credentials if the device allows it, and monitor the device for any unauthorized access attempts.'}, {'type': 'paragraph', 'content': 'Physically securing the device to prevent UART interface access is also recommended to avoid firmware extraction and further compromise.'}] [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart