Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24498: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in EFM-Networks, Inc. ipTIME T5008

0
Medium
VulnerabilityCVE-2026-24498cvecve-2026-24498cwe-200
Published: Fri Feb 27 2026 (02/27/2026, 02:01:12 UTC)
Source: CVE Database V5
Vendor/Project: EFM-Networks, Inc.
Product: ipTIME T5008

Description

CVE-2026-24498 is a medium-severity vulnerability affecting multiple EFM-Networks ipTIME router models, including T5008, AX2004M, AX3000Q, and AX6000M, up to firmware version 15. 26. 8. The flaw allows unauthorized actors to bypass authentication and gain access to sensitive information, classified under CWE-200 (Exposure of Sensitive Information). Exploitation does not require user interaction or privileges but requires adjacent network access. The vulnerability impacts confidentiality but does not affect integrity or availability. No known exploits are reported in the wild yet. Organizations using these routers should prioritize firmware updates once patches are available and implement network segmentation to limit exposure. Countries with significant deployments of ipTIME devices, especially South Korea and neighboring regions, face the highest risk. Given the medium CVSS score of 6.

AI-Powered Analysis

AILast updated: 02/27/2026, 02:43:12 UTC

Technical Analysis

CVE-2026-24498 is a vulnerability identified in several EFM-Networks ipTIME router models (T5008, AX2004M, AX3000Q, AX6000M) running firmware versions up to 15.26.8. The issue is categorized under CWE-200, indicating exposure of sensitive information to unauthorized actors. The vulnerability enables authentication bypass, allowing an attacker without prior privileges or user interaction to access sensitive data stored or processed by the device. The CVSS 4.0 vector (AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates that the attack requires adjacent network access (local network), has low attack complexity, partial attack type (partial bypass), no privileges required, no user interaction, and impacts confidentiality with high scope, but no impact on integrity or availability. The flaw likely stems from improper access controls or flawed authentication mechanisms in the router's management interface or services. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The affected devices are widely used in South Korea and some other Asian markets, making regional exposure significant. The vulnerability could allow attackers on the same network segment to extract sensitive configuration or user data, potentially enabling further attacks or privacy violations.

Potential Impact

The primary impact of CVE-2026-24498 is the unauthorized disclosure of sensitive information from affected ipTIME routers. This can lead to leakage of network configuration details, credentials, or other private data, which attackers could leverage for lateral movement, persistent access, or further exploitation. While the vulnerability does not directly compromise device integrity or availability, the confidentiality breach can undermine network security and user privacy. Organizations relying on these routers, especially in enterprise or critical infrastructure environments, may face increased risk of targeted attacks if attackers gain footholds via this vulnerability. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, as attackers could gain local network access through compromised devices or insider threats. The absence of known exploits reduces immediate risk but does not preclude future active exploitation. Overall, the vulnerability poses a moderate threat to confidentiality and network security posture.

Mitigation Recommendations

1. Monitor EFM-Networks official channels for firmware updates addressing CVE-2026-24498 and apply patches immediately upon release. 2. Until patches are available, restrict access to router management interfaces to trusted administrators only, preferably via secure management VLANs or out-of-band management networks. 3. Implement strict network segmentation to isolate ipTIME devices from untrusted or guest networks, minimizing adjacent network exposure. 4. Disable any unnecessary services or remote management features on affected routers to reduce attack surface. 5. Employ network monitoring and intrusion detection systems to identify unusual access patterns or attempts to access router management interfaces. 6. Educate network administrators about the vulnerability and enforce strong authentication and credential management practices. 7. Consider replacing affected devices with alternative hardware if timely patching is not feasible and risk is unacceptable. 8. Conduct regular security audits and vulnerability assessments focusing on network infrastructure devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
krcert
Date Reserved
2026-01-23T05:22:54.361Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a100c232ffcdb8a2a64f97

Added to database: 2/27/2026, 2:26:10 AM

Last enriched: 2/27/2026, 2:43:12 AM

Last updated: 2/27/2026, 5:30:30 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses