Impact
The vulnerability is located in the commit_vpncli_file_upload function of /cgi/timepro.cgi on the EFM iptime A6004MX 14.18.2 firmware. An attacker can upload an arbitrary file without any checks, allowing potential execution of malicious code or injection of unauthorized content. The flaw is classified as an Access Control weakness (CWE-284) and an Unrestricted Upload of File (CWE-434). The CVSS score of 9.3 reflects its high impact on confidentiality, integrity, and availability.
Affected Systems
The affected devices are the EFM iptime A6004MX routers running firmware version 14.18.2. No other firmware versions or models are listed in the CNA data, so only the specified model and version should be considered at risk.
Risk and Exploitability
The flaw is exploitable remotely by sending a crafted HTTP request to the /cgi/timepro.cgi endpoint. An attacker can upload a malicious script or executable, potentially leading to remote code execution. The EPSS score of less than 1% indicates a low likelihood of widespread exploitation, but a public exploit exists, and the vulnerability is not currently in the CISA KEV catalog. Nevertheless, given the severity score, an attacker could compromise the device if the endpoint remains exposed.
OpenCVE Enrichment