Cyber Posture

CVE-2026-30702

Critical

Published: 18 March 2026

Published
18 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through…

more

forced browsing

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for logical access to information and system resources, directly preventing authentication bypass via forced browsing to restricted web endpoints.

prevent

Implements a reference monitor to mediate and enforce access control policies on all requests, blocking unauthorized direct access to protected management interface endpoints.

prevent

Employs least privilege for web management functions, reducing the scope and impact of unauthorized access gained through authentication bypass.

Security SummaryAI

CVE-2026-30702 is a critical authentication bypass vulnerability (CVSS 3.1 score of 9.8) affecting the WiFi Extender WDR201A device, specifically hardware version 2.1 running firmware LFMZX28040922V1.02. The flaw stems from a broken authentication mechanism in the web management interface, where the login page fails to properly enforce session validation. This allows attackers to bypass authentication entirely by directly accessing restricted web application endpoints via forced browsing techniques, as classified under CWE-285 (Improper Authorization).

The vulnerability is exploitable remotely over the network (AV:N) with low complexity (AC:L), requiring no privileges (PR:N), no user interaction (UI:N), and no scope change (S:U), resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H). Any unauthenticated attacker who can reach the device's web interface—typically on the local network—can exploit it to gain unauthorized administrative access, potentially enabling full device compromise, configuration changes, or further network pivoting.

Advisories reference a security research disclosure detailing this and other CVEs in the device at https://mstreet97.github.io/security-research/iot/vulnerability-disclosure/cybersecurity/cve/2026/02/18/From-Blackbox-to-Whitebox-Multiple-CVEs-in-a-Consumer-WiFi-Extender.html, along with the manufacturer's site at https://www.made-in-china.com/showroom/yeapook/. No specific patches or mitigations are detailed in the provided information.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing web management interface of a WiFi extender, exploitable remotely via forced browsing, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References