Description
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.
Published: 2026-02-27
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass and Sensitive Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in the firmware of ipTIME routers permits an unauthenticated attacker to bypass standard authentication mechanisms and retrieve sensitive information stored on the device. The weakness corresponds to CWE‑200, focusing on exposing private data. The vulnerability does not grant execution privileges, but it allows read access to configuration, user database, or other confidential information, potentially enabling further manipulation of device settings or network traffic.

Affected Systems

The affected devices include all EFM‑Networks, Inc. ipTIME models: the ax2004m, ax3000q, ax6000m, and t5008. Firmware versions through 15.26.8 are impacted. Users of these routers should verify their firmware version and ensure it is at least 15.26.9 or later to mitigate the issue.

Risk and Exploitability

The CVSS score of 6 indicates a moderate severity, reflecting the combination of authentication bypass and data disclosure. EPSS shows an exploitation probability of less than 1 %, implying that while the vulnerability exists, it is unlikely to be widely targeted. The vulnerability is not listed in the CISA KEV catalog. Attackers typically need to be within the local network or have a path to the router’s management interface; precise exploitation details are not provided, so the presumed attack vector is internal or adjacent network access, with the attacker leveraging the weak authentication check to read information.

Generated by OpenCVE AI on April 17, 2026 at 14:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to a version that fixes the authentication bypass, preferably 15.26.9 or later for all impacted models.
  • Restrict management access by disabling remote web management or configuring firewall rules to limit administrative interface connectivity only to trusted IP addresses.
  • Change default or weak passwords on all administrative accounts and enable multi‑factor or more robust authentication options if available; monitor device logs for repeated unauthorized access attempts.

Generated by OpenCVE AI on April 17, 2026 at 14:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Authentication Bypass and Sensitive Information Exposure in ipTIME Routers

Tue, 17 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Iptime
Iptime ax2004m
Iptime ax2004m Firmware
Iptime ax3000q
Iptime ax3000q Firmware
Iptime ax6000m
Iptime ax6000m Firmware
Iptime t5008
Iptime t5008 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:iptime:ax2004m:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:ax3000q:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:ax6000m:-:*:*:*:*:*:*:*
cpe:2.3:h:iptime:t5008:-:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax2004m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax3000q_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:ax6000m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:iptime:t5008_firmware:*:*:*:*:*:*:*:*
Vendors & Products Iptime
Iptime ax2004m
Iptime ax2004m Firmware
Iptime ax3000q
Iptime ax3000q Firmware
Iptime ax6000m
Iptime ax6000m Firmware
Iptime t5008
Iptime t5008 Firmware
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Efm-networks
Efm-networks iptime Ax2004m
Efm-networks iptime Ax3000q
Efm-networks iptime Ax6000m
Efm-networks iptime T5008
Vendors & Products Efm-networks
Efm-networks iptime Ax2004m
Efm-networks iptime Ax3000q
Efm-networks iptime Ax6000m
Efm-networks iptime T5008

Fri, 27 Feb 2026 02:15:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.
Weaknesses CWE-200
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Efm-networks Iptime Ax2004m Iptime Ax3000q Iptime Ax6000m Iptime T5008
Iptime Ax2004m Ax2004m Firmware Ax3000q Ax3000q Firmware Ax6000m Ax6000m Firmware T5008 T5008 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: krcert

Published:

Updated: 2026-02-27T16:03:35.360Z

Reserved: 2026-01-23T05:22:54.361Z

Link: CVE-2026-24498

cve-icon Vulnrichment

Updated: 2026-02-27T16:03:27.316Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T02:16:19.403

Modified: 2026-03-17T15:46:33.370

Link: CVE-2026-24498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:15:21Z

Weaknesses