Description
A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authentication
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the Hidden Hiddenloginsetup interface of the EFM ipTIME A8004T router firmware 14.18.2. The function httpcon_check_session_url in /cgi/timepro.cgi allows an attacker to bypass authentication and gain unauthorized access. The weakness is a CWE-287 Improper Authentication flaw. Because the flaw is triggered by manipulating input parameters, an attacker can perform it remotely without prior access, potentially exposing sensitive configuration settings.

Affected Systems

This flaw affects only the EFM ipTIME A8004T model running firmware version 14.18.2. No other models or firmware versions are explicitly listed as impacted.

Risk and Exploitability

The vulnerability is assigned a CVSS score of 6.9, indicating moderate severity, and has an EPSS of less than 1 %, suggesting a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Attackers can exploit it remotely to bypass authentication, which could lead to full control over the router’s configuration interface. No special prerequisites are noted beyond the ability to send crafted requests to the device.

Generated by OpenCVE AI on April 18, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from the vendor that addresses the authentication bypass in httpcon_check_session_url.
  • If a firmware update is unavailable, block or restrict access to the /cgi/timepro.cgi endpoint with firewall rules or network segmentation.
  • Enforce strong, unique credentials for all administrative interfaces and routinely review account permissions.

Generated by OpenCVE AI on April 18, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Iptime a8004t Firmware
CPEs cpe:2.3:h:iptime:a8004t:-:*:*:*:*:*:*:*
cpe:2.3:o:iptime:a8004t_firmware:14.18.2:*:*:*:*:*:*:*
Vendors & Products Iptime a8004t Firmware

Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Iptime
Iptime a8004t
Vendors & Products Iptime
Iptime a8004t

Mon, 02 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title EFM ipTIME A8004T Hidden Hiddenloginsetup timepro.cgi httpcon_check_session_url improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Iptime A8004t A8004t Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:13:08.582Z

Reserved: 2026-02-01T08:06:14.412Z

Link: CVE-2026-1740

cve-icon Vulnrichment

Updated: 2026-02-02T14:15:03.614Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T04:15:54.963

Modified: 2026-03-10T18:25:25.653

Link: CVE-2026-1740

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses