CVE-2020-8974: CWE-434 Unrestricted Upload of File with Dangerous Type in ZGR ZGR TPS200 NG
In ZGR TPS200 NG 2.00 firmware version and 1.01 hardware version, the firmware upload process does not perform any type of restriction. This allows an attacker to modify it and re-upload it via web with malicious modifications, rendering the device unusable.
AI Analysis
Technical Summary
CVE-2020-8974 is a critical vulnerability affecting the ZGR TPS200 NG device, specifically firmware version 2.00 and hardware version 1.01. The vulnerability arises from the device's firmware upload process, which lacks any restrictions on the type of files that can be uploaded. This corresponds to CWE-434, which is an unrestricted upload of files with dangerous types. An attacker can exploit this flaw by crafting a malicious firmware image or file and uploading it through the device's web interface without any authentication or user interaction required. Because the device does not validate or restrict the file type, the attacker can replace the legitimate firmware with a malicious one, leading to a complete compromise of the device's integrity and availability. The CVSS v3.1 score is 10.0 (critical), reflecting the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope change (S:C). The impact is high on integrity and availability, as the device can be rendered unusable or potentially controlled by an attacker. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make it a significant threat. The vulnerability affects a specific industrial or network device, the ZGR TPS200 NG, which may be used in various operational environments requiring secure and reliable firmware updates.
Potential Impact
For European organizations using the ZGR TPS200 NG device, this vulnerability poses a severe risk. The ability for an unauthenticated attacker to upload malicious firmware can lead to device bricking, denial of service, or potentially turning the device into a foothold for further network compromise. This is especially critical in industrial, infrastructure, or enterprise environments where such devices may be part of critical communication or control systems. The loss of device availability or integrity can disrupt business operations, cause safety issues, or lead to data breaches if the device is part of a larger network. Given the critical CVSS score and the lack of authentication or user interaction requirements, attackers could exploit this vulnerability remotely over the network, increasing the risk of widespread impact. European organizations with these devices in their infrastructure should consider this a high-priority threat.
Mitigation Recommendations
Since no official patches or firmware updates are currently linked, organizations should implement compensating controls immediately. These include restricting network access to the device's management interface by using network segmentation and firewall rules to limit access only to trusted administrators. Employ VPNs or secure management channels to access the device remotely. Monitor network traffic for unusual firmware upload attempts or unauthorized access patterns. If possible, disable the web-based firmware upload feature until a patch is available. Regularly audit and inventory devices to identify all ZGR TPS200 NG units in use. Engage with the vendor to obtain firmware updates or security advisories. Additionally, implement strict change management and incident response plans to quickly react if a device is compromised. Consider deploying intrusion detection systems that can detect anomalous firmware upload activities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2020-8974: CWE-434 Unrestricted Upload of File with Dangerous Type in ZGR ZGR TPS200 NG
Description
In ZGR TPS200 NG 2.00 firmware version and 1.01 hardware version, the firmware upload process does not perform any type of restriction. This allows an attacker to modify it and re-upload it via web with malicious modifications, rendering the device unusable.
AI-Powered Analysis
Technical Analysis
CVE-2020-8974 is a critical vulnerability affecting the ZGR TPS200 NG device, specifically firmware version 2.00 and hardware version 1.01. The vulnerability arises from the device's firmware upload process, which lacks any restrictions on the type of files that can be uploaded. This corresponds to CWE-434, which is an unrestricted upload of files with dangerous types. An attacker can exploit this flaw by crafting a malicious firmware image or file and uploading it through the device's web interface without any authentication or user interaction required. Because the device does not validate or restrict the file type, the attacker can replace the legitimate firmware with a malicious one, leading to a complete compromise of the device's integrity and availability. The CVSS v3.1 score is 10.0 (critical), reflecting the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope change (S:C). The impact is high on integrity and availability, as the device can be rendered unusable or potentially controlled by an attacker. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make it a significant threat. The vulnerability affects a specific industrial or network device, the ZGR TPS200 NG, which may be used in various operational environments requiring secure and reliable firmware updates.
Potential Impact
For European organizations using the ZGR TPS200 NG device, this vulnerability poses a severe risk. The ability for an unauthenticated attacker to upload malicious firmware can lead to device bricking, denial of service, or potentially turning the device into a foothold for further network compromise. This is especially critical in industrial, infrastructure, or enterprise environments where such devices may be part of critical communication or control systems. The loss of device availability or integrity can disrupt business operations, cause safety issues, or lead to data breaches if the device is part of a larger network. Given the critical CVSS score and the lack of authentication or user interaction requirements, attackers could exploit this vulnerability remotely over the network, increasing the risk of widespread impact. European organizations with these devices in their infrastructure should consider this a high-priority threat.
Mitigation Recommendations
Since no official patches or firmware updates are currently linked, organizations should implement compensating controls immediately. These include restricting network access to the device's management interface by using network segmentation and firewall rules to limit access only to trusted administrators. Employ VPNs or secure management channels to access the device remotely. Monitor network traffic for unusual firmware upload attempts or unauthorized access patterns. If possible, disable the web-based firmware upload feature until a patch is available. Regularly audit and inventory devices to identify all ZGR TPS200 NG units in use. Engage with the vendor to obtain firmware updates or security advisories. Additionally, implement strict change management and incident response plans to quickly react if a device is compromised. Consider deploying intrusion detection systems that can detect anomalous firmware upload activities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCIBE
- Date Reserved
- 2020-02-13T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd6390
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/4/2025, 9:11:41 PM
Last updated: 8/19/2025, 5:22:44 AM
Views: 13
Related Threats
CVE-2025-9300: Stack-based Buffer Overflow in saitoha libsixel
MediumCVE-2025-47184: n/a
UnknownCVE-2025-9299: Stack-based Buffer Overflow in Tenda M3
HighCVE-2025-9298: Stack-based Buffer Overflow in Tenda M3
HighCVE-2025-9297: Stack-based Buffer Overflow in Tenda i22
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.