Impact
The vulnerability lies in the httpcon_check_session_url function within the Debug Interface of EFM ipTIME A8004T firmware 14.18.2. By manipulating the "cmd" argument in the /sess-bin/d.cgi endpoint, an attacker can trigger a backdoor that yields remote code execution capabilities. The flaw is categorized as CWE‑912. Remote exploitation would allow an attacker to run arbitrary commands, compromising the device.
Affected Systems
Affected vendors and products: EFM ipTIME A8004T router running firmware version 14.18.2. The product is the Debug Interface component, specifically the /sess-bin/d.cgi file. Currently identified only in ipTIME A8004T firmware 14.18.2.
Risk and Exploitability
The CVSS base score is 7.5, indicating a high severity. EPSS indicates the probability of exploitation is less than 1%, implying low overall risk compared to other vulnerabilities. The vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires manipulating a query parameter from a remote connection and is considered difficult. Nevertheless, if successful, it can lead to full device compromise. The attack vector is remote through the debugging interface.
OpenCVE Enrichment