Skip to main content

CVE-2020-8974: CWE-434 Unrestricted Upload of File with Dangerous Type in ZGR ZGR TPS200 NG

Critical
VulnerabilityCVE-2020-8974cvecve-2020-8974cwe-434
Published: Mon Oct 17 2022 (10/17/2022, 21:16:42 UTC)
Source: CVE
Vendor/Project: ZGR
Product: ZGR TPS200 NG

Description

In ZGR TPS200 NG 2.00 firmware version and 1.01 hardware version, the firmware upload process does not perform any type of restriction. This allows an attacker to modify it and re-upload it via web with malicious modifications, rendering the device unusable.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:11:41 UTC

Technical Analysis

CVE-2020-8974 is a critical vulnerability affecting the ZGR TPS200 NG device, specifically firmware version 2.00 and hardware version 1.01. The vulnerability arises from the device's firmware upload process, which lacks any restrictions on the type of files that can be uploaded. This corresponds to CWE-434, which is an unrestricted upload of files with dangerous types. An attacker can exploit this flaw by crafting a malicious firmware image or file and uploading it through the device's web interface without any authentication or user interaction required. Because the device does not validate or restrict the file type, the attacker can replace the legitimate firmware with a malicious one, leading to a complete compromise of the device's integrity and availability. The CVSS v3.1 score is 10.0 (critical), reflecting the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope change (S:C). The impact is high on integrity and availability, as the device can be rendered unusable or potentially controlled by an attacker. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make it a significant threat. The vulnerability affects a specific industrial or network device, the ZGR TPS200 NG, which may be used in various operational environments requiring secure and reliable firmware updates.

Potential Impact

For European organizations using the ZGR TPS200 NG device, this vulnerability poses a severe risk. The ability for an unauthenticated attacker to upload malicious firmware can lead to device bricking, denial of service, or potentially turning the device into a foothold for further network compromise. This is especially critical in industrial, infrastructure, or enterprise environments where such devices may be part of critical communication or control systems. The loss of device availability or integrity can disrupt business operations, cause safety issues, or lead to data breaches if the device is part of a larger network. Given the critical CVSS score and the lack of authentication or user interaction requirements, attackers could exploit this vulnerability remotely over the network, increasing the risk of widespread impact. European organizations with these devices in their infrastructure should consider this a high-priority threat.

Mitigation Recommendations

Since no official patches or firmware updates are currently linked, organizations should implement compensating controls immediately. These include restricting network access to the device's management interface by using network segmentation and firewall rules to limit access only to trusted administrators. Employ VPNs or secure management channels to access the device remotely. Monitor network traffic for unusual firmware upload attempts or unauthorized access patterns. If possible, disable the web-based firmware upload feature until a patch is available. Regularly audit and inventory devices to identify all ZGR TPS200 NG units in use. Engage with the vendor to obtain firmware updates or security advisories. Additionally, implement strict change management and incident response plans to quickly react if a device is compromised. Consider deploying intrusion detection systems that can detect anomalous firmware upload activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2020-02-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6390

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 9:11:41 PM

Last updated: 8/19/2025, 5:22:44 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats