Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1742: Unrestricted Upload in EFM ipTIME A8004T

0
Medium
VulnerabilityCVE-2026-1742cvecve-2026-1742
Published: Mon Feb 02 2026 (02/02/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: EFM
Product: ipTIME A8004T

Description

A vulnerability was identified in EFM ipTIME A8004T 14.18.2. Affected by this vulnerability is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi of the component VPN Service. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:56:06 UTC

Technical Analysis

CVE-2026-1742 is a vulnerability discovered in the EFM ipTIME A8004T router firmware version 14.18.2, specifically in the VPN service component. The flaw exists in the commit_vpncli_file_upload function within the /cgi/timepro.cgi endpoint, which improperly restricts file uploads, allowing an attacker to upload arbitrary files without sufficient validation or restrictions. This unrestricted upload capability can be exploited remotely, enabling an attacker with high privileges to place malicious files on the device. The vulnerability does not require user interaction but does require the attacker to have high privileges, which implies that initial authentication or elevated access is necessary before exploitation. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting a medium severity level due to the combination of remote exploitability and required privileges. The vendor was contacted early but has not issued a patch or response, and exploit code is publicly available, increasing the risk of exploitation. The flaw could be leveraged to execute arbitrary code, disrupt VPN services, or compromise device integrity and confidentiality. No known exploits in the wild have been reported yet, but the availability of exploit code suggests potential future attacks. The lack of patch or mitigation guidance from the vendor leaves users exposed. This vulnerability highlights the importance of secure file upload handling and timely vendor response in embedded device firmware.

Potential Impact

The impact of CVE-2026-1742 on organizations using the EFM ipTIME A8004T router can be significant, particularly in environments relying on VPN services for secure remote access. Successful exploitation could allow attackers to upload malicious files, potentially leading to unauthorized code execution, disruption of VPN connectivity, or persistent compromise of the device. This could result in loss of confidentiality of network traffic, integrity breaches through manipulation of device configurations or firmware, and availability issues if the VPN service or router functionality is disrupted. Since the vulnerability requires high privileges, the initial compromise vector might involve credential theft or exploitation of other vulnerabilities, but once achieved, the attacker gains a powerful foothold. Organizations could face data breaches, network infiltration, or lateral movement facilitated by compromised VPN infrastructure. The absence of vendor patches and public exploit code increases the likelihood of exploitation attempts, especially targeting organizations with limited network segmentation or monitoring. This vulnerability poses a moderate risk to critical infrastructure, enterprises, and small-to-medium businesses using this router model, especially where VPN security is paramount.

Mitigation Recommendations

Given the lack of an official patch from the vendor, organizations should implement several specific mitigations: 1) Restrict administrative access to the router’s management interface and VPN services to trusted IP addresses and networks only, minimizing exposure to potential attackers. 2) Enforce strong authentication mechanisms and regularly update credentials to reduce the risk of privilege escalation that could enable exploitation. 3) Monitor network traffic and device logs for unusual file upload activity or unauthorized access attempts to detect exploitation early. 4) Where possible, isolate the affected router from critical network segments to limit the impact of a compromise. 5) Consider deploying network-based intrusion detection or prevention systems (IDS/IPS) with signatures targeting known exploit patterns for this vulnerability. 6) Evaluate alternative VPN solutions or router models with active vendor support and timely security updates. 7) If feasible, disable the vulnerable VPN service or the affected CGI endpoint until a patch is available. 8) Maintain regular backups of router configurations to enable rapid recovery in case of compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and network segmentation specific to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-01T08:06:24.769Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69802440ac06320222ae2d97

Added to database: 2/2/2026, 4:12:48 AM

Last enriched: 2/23/2026, 9:56:06 PM

Last updated: 3/25/2026, 4:33:30 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses