Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1742: Unrestricted Upload in EFM ipTIME A8004T

0
Medium
VulnerabilityCVE-2026-1742cvecve-2026-1742
Published: Mon Feb 02 2026 (02/02/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: EFM
Product: ipTIME A8004T

Description

A vulnerability was identified in EFM ipTIME A8004T 14.18.2. Affected by this vulnerability is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi of the component VPN Service. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/02/2026, 04:27:29 UTC

Technical Analysis

CVE-2026-1742 is a vulnerability identified in the EFM ipTIME A8004T router firmware version 14.18.2. The issue resides in the VPN service component, specifically in the commit_vpncli_file_upload function of the /cgi/timepro.cgi endpoint. This function improperly handles file uploads, allowing an attacker to perform unrestricted uploads remotely. The vulnerability does not require user interaction but does require high privileges (PR:H) to exploit, indicating that an attacker must already have some level of elevated access to the device or network. The flaw could allow an attacker to upload malicious files, potentially leading to unauthorized code execution, configuration manipulation, or denial of service. The vendor was contacted but did not respond, and no patches or mitigations have been officially released. The CVSS 4.0 vector indicates network attack vector (AV:N), low complexity (AC:L), no authentication required (AT:N), and no user interaction (UI:N), but with high privileges required (PR:H). The impact on confidentiality, integrity, and availability is low to medium, as the vulnerability could be leveraged to compromise device security but requires prior access. The exploit code is publicly available, increasing the risk of exploitation despite no known active attacks. This vulnerability highlights the risks associated with insufficient input validation and access control in embedded device management interfaces.

Potential Impact

For European organizations, exploitation of CVE-2026-1742 could lead to unauthorized file uploads on EFM ipTIME A8004T routers, potentially resulting in device compromise, network disruption, or data leakage. Since the vulnerability requires high privileges, it is most dangerous in environments where attackers have already gained some foothold, such as through phishing or insider threats. Compromise of VPN routers can undermine secure remote access, exposing internal networks to further attacks. This could affect confidentiality by exposing sensitive communications, integrity by allowing malicious configuration changes, and availability by causing device instability or denial of service. Organizations relying on these routers for VPN connectivity or perimeter defense may face operational disruptions and increased risk of lateral movement by attackers. The lack of vendor response and patches increases the urgency for organizations to implement compensating controls. Given the public availability of exploit code, the window for exploitation may widen, especially targeting less monitored or poorly secured networks.

Mitigation Recommendations

1. Immediately audit networks to identify any deployed EFM ipTIME A8004T routers running firmware version 14.18.2. 2. Isolate affected devices from critical network segments and restrict management interface access to trusted administrators only. 3. Implement network-level controls such as firewall rules to block access to the /cgi/timepro.cgi endpoint from untrusted sources. 4. Monitor device logs and network traffic for unusual file upload attempts or suspicious activity related to the VPN service. 5. Employ network segmentation to limit the impact of a compromised router. 6. If possible, downgrade privileges or disable the vulnerable VPN service component until a patch is available. 7. Engage with EFM or trusted third parties for potential unofficial patches or workarounds. 8. Enhance endpoint security to prevent attackers from gaining the high privileges required to exploit this vulnerability. 9. Conduct regular vulnerability assessments and penetration tests focusing on router management interfaces. 10. Prepare incident response plans specifically addressing router compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-01T08:06:24.769Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69802440ac06320222ae2d97

Added to database: 2/2/2026, 4:12:48 AM

Last enriched: 2/2/2026, 4:27:29 AM

Last updated: 2/6/2026, 12:32:17 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats