Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4537: Command Injection in Cudy TR1200

0
Medium
VulnerabilityCVE-2026-4537cvecve-2026-4537
Published: Sun Mar 22 2026 (03/22/2026, 04:02:14 UTC)
Source: CVE Database V5
Vendor/Project: Cudy
Product: TR1200

Description

CVE-2026-4537 is a medium-severity command injection vulnerability found in the Cudy TR1200 router, specifically in the action_ipsec_conn function of the /usr/bin/lib/lua/luci/controller/ipsec. lua file. This flaw allows a remote attacker with high privileges to execute arbitrary commands on the device without user interaction. The affected firmware version is R46-2. 4. 15-20250721-164017. Although the vendor was notified, no response or patch has been issued. Exploitation requires no user interaction but does require privileged access, limiting the attack surface somewhat. The vulnerability could lead to compromise of the router, impacting confidentiality, integrity, and availability of network traffic. Organizations using this device should implement strict network segmentation, monitor for suspicious activity, and consider alternative devices or firmware until a patch is available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 04:46:15 UTC

Technical Analysis

CVE-2026-4537 is a command injection vulnerability identified in the Cudy TR1200 router firmware version R46-2.4.15-20250721-164017. The vulnerability resides in the action_ipsec_conn function within the Lua controller script located at /usr/bin/lib/lua/luci/controller/ipsec.lua. This function improperly sanitizes input, allowing an attacker to inject arbitrary commands into the system shell. The attack vector is remote network access, but exploitation requires the attacker to have high-level privileges on the device, such as administrative or root access. No user interaction is necessary for exploitation, and the vulnerability affects confidentiality, integrity, and availability of the device and potentially the network it protects. The vendor was contacted early about the issue but has not responded or released a patch, increasing the risk of exploitation over time. Although no known exploits are currently active in the wild, the public disclosure of the vulnerability and the availability of technical details raise the likelihood of future exploitation attempts. The CVSS 4.0 base score of 5.1 reflects a medium severity rating, considering the ease of exploitation is limited by privilege requirements but the impact on device security is significant. The vulnerability could allow attackers to execute arbitrary commands, potentially leading to device takeover, interception or manipulation of IPsec VPN traffic, and disruption of network services.

Potential Impact

The exploitation of CVE-2026-4537 can have significant consequences for organizations using the Cudy TR1200 router. Successful command injection could allow attackers to execute arbitrary commands with high privileges, leading to full device compromise. This can result in unauthorized access to sensitive network traffic, especially IPsec VPN connections, undermining confidentiality. Integrity of data and configurations can be altered, and availability of network services may be disrupted by malicious commands or persistent backdoors. Organizations relying on these routers for secure communications could face data breaches, espionage, or denial of service conditions. The lack of a vendor patch increases exposure duration, raising the risk of exploitation. Given the router’s role in network infrastructure, compromise could serve as a foothold for lateral movement within corporate or governmental networks. The medium severity rating reflects the requirement for privileged access, which limits the attack surface but does not eliminate risk, especially in environments where administrative credentials may be compromised or default credentials remain in use.

Mitigation Recommendations

To mitigate CVE-2026-4537, organizations should first assess whether they use the affected firmware version R46-2.4.15-20250721-164017 on Cudy TR1200 devices. Immediate steps include restricting remote management access to trusted IP addresses and networks, disabling unnecessary services, and enforcing strong authentication mechanisms to prevent unauthorized privilege escalation. Network segmentation should isolate these routers from critical infrastructure to limit potential lateral movement. Continuous monitoring for unusual command execution or network behavior indicative of compromise is essential. Since no official patch is available, consider deploying alternative hardware or firmware versions not affected by this vulnerability. If possible, implement compensating controls such as VPN concentrators or firewalls to reduce exposure. Regularly review and update device credentials and configurations to minimize privilege misuse. Engage with Cudy or third-party security communities for updates or unofficial patches. Finally, prepare incident response plans specific to router compromise scenarios to enable rapid containment and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-21T08:08:42.500Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bf707bf4197a8e3b474c59

Added to database: 3/22/2026, 4:30:51 AM

Last enriched: 3/22/2026, 4:46:15 AM

Last updated: 3/22/2026, 6:47:09 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses