Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14485: Command Injection in EFM ipTIME A3004T

0
Low
VulnerabilityCVE-2025-14485cvecve-2025-14485
Published: Thu Dec 11 2025 (12/11/2025, 03:02:11 UTC)
Source: CVE Database V5
Vendor/Project: EFM
Product: ipTIME A3004T

Description

A weakness has been identified in EFM ipTIME A3004T 14.19.0. This vulnerability affects the function show_debug_screen of the file /sess-bin/timepro.cgi of the component Administrator Password Handler. This manipulation of the argument aaksjdkfj with the input !@dnjsrureljrm*& causes command injection. The attack is possible to be carried out remotely. The complexity of an attack is rather high. It is stated that the exploitability is difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/18/2025, 04:58:48 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14485 affects the EFM ipTIME A3004T router firmware version 14.19.0. It resides in the show_debug_screen function within the /sess-bin/timepro.cgi file, specifically in the Administrator Password Handler component. The flaw is a command injection vulnerability triggered by manipulation of the argument named aaksjdkfj with crafted input containing special characters (!@dnjsrureljrm*&). This allows an attacker to execute arbitrary commands on the device remotely without authentication or user interaction. However, the attack complexity is high, meaning exploitation requires significant technical skill and precise conditions. The vendor was notified but has not responded or provided a patch, and an exploit has been publicly disclosed. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability does not affect system components beyond the router’s administrative interface, limiting the scope of impact. This vulnerability could allow attackers to gain control over the router, potentially leading to network traffic interception, device manipulation, or pivoting to internal networks.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the deployment scale of the EFM ipTIME A3004T routers. If these devices are used in home offices, small businesses, or branch offices, successful exploitation could lead to unauthorized command execution on the router, compromising network integrity and confidentiality. Attackers could manipulate routing, intercept or redirect traffic, or use the compromised device as a foothold for further internal network attacks. However, the high complexity of exploitation and low CVSS score suggest that widespread attacks are less likely. The lack of vendor response and patch increases risk over time, especially if attackers develop more reliable exploits. Organizations relying on these routers without proper network segmentation or monitoring could face data breaches or service disruptions. The threat is more pronounced in environments where remote management is enabled or where the device firmware is outdated.

Mitigation Recommendations

1. Immediately disable remote management interfaces on the EFM ipTIME A3004T routers to reduce exposure to external attackers. 2. Implement strict network segmentation to isolate routers from critical internal systems and sensitive data. 3. Monitor network traffic and device logs for unusual command execution patterns or unexpected administrative activity. 4. Restrict access to router management interfaces to trusted IP addresses or VPN connections only. 5. Regularly audit and update router firmware; although no patch is currently available, monitor vendor communications for updates. 6. Consider replacing affected devices with alternative routers from vendors with active security support if feasible. 7. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection attempts targeting router management interfaces. 8. Educate IT staff on the specific vulnerability and signs of exploitation to enable rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-10T20:08:54.803Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693a37b4bbbecd30a6f5d200

Added to database: 12/11/2025, 3:17:08 AM

Last enriched: 12/18/2025, 4:58:48 AM

Last updated: 2/7/2026, 2:50:16 AM

Views: 207

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats