CVE-2026-2550:
CVE-2026-2550
A vulnerability was found in EFM iptime A6004MX 14.18.2. Affected is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi. The manipulation results in unrestricted upload. The attack ma...
Security Advisory: Critical Unrestricted File Upload Vulnerability in iptime A6004MX Router
Overview
A critical security flaw has been identified in the EFM iptime A6004MX wireless router, firmware version 14.18.2. The vulnerability resides in a specific function (commit_vpncli_file_upload) within the router’s web management interface (/cgi/timepro.cgi). This flaw allows an unauthenticated attacker to upload arbitrary files to the device without restriction.
Vulnerability Details
In simple terms, the router’s web interface contains a feature for uploading VPN client configuration files. Due to insufficient security checks, this feature does not properly validate what is being uploaded or who is uploading it. An attacker can remotely send a malicious file directly to this interface. Because the attack can be launched without any login credentials, it is exceptionally dangerous.
Impact
If successfully exploited, this vulnerability can have severe consequences:
- Complete System Compromise: An attacker can upload a malicious script or firmware file, potentially gaining full control over the router.
- Network Infiltration: Once the router is compromised, the attacker can intercept, redirect, or monitor all network traffic passing through it (a “man-in-the-middle” attack).
- Malware Distribution: The compromised router can be used to redirect users to phishing sites or infect devices on the local network with malware.
- Persistence: Malicious files could survive router reboots, making the infection difficult to remove.
The public disclosure of an exploit increases the likelihood of widespread attacks.
Remediation and Mitigation Steps
Primary Action: Immediate Firmware Update
- Check for Updates: Log in to your iptime A6004MX router’s web administration panel. Navigate to the firmware update section (often under “Management” or “System”).
- Apply Patch: Install the latest official firmware version provided by EFM. If a specific patch for CVE-2026-2550 is listed, apply it immediately. If no update addressing this CVE is yet available, updating to the most recent firmware is still critical, as it may contain a fix.
Critical Interim Mitigations (If No Patch is Available):
- Restrict Access: Immediately disable remote administration (WAN-side access) to the router’s management interface. Ensure it is only accessible from your local network (LAN).
- Network Segmentation: If possible, place the router in a demilitarized zone (DMZ) or behind a firewall that restricts inbound connections to it from the internet.
- Monitor for Compromise: Be vigilant for signs of compromise, such as unexpected configuration changes, slow network performance, or unknown devices listed in the router’s client table.
Vendor Status: The vendor was contacted prior to public disclosure but has not responded. Users should proactively monitor the official EFM website for security announcements and firmware releases.
Note: Due to the critical nature (CVSS 9.8) and public exploit availability, treating this vulnerability with the highest priority is essential for maintaining network security.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allow...
A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests....
Reviactyl is an open-source game server management panel built using Laravel, React, FilamentPHP, Vite, and Go. From version 26.2.0-beta.1 to before version 26.2.0-beta.5, a vulnerability in the OAuth...