Impact
The vulnerability lies within the action_ipsec_conn function in /usr/bin/lib/lua/luci/controller/ipsec.lua on Cudy TR1200 routers. An attacker can manipulate the input to execute arbitrary shell commands remotely. The injected commands run with the privileges of the router's internal scripting engine, potentially allowing full device takeover. This issue is classified as CWE‑74 and CWE‑77.
Affected Systems
Cudy TR1200 routers running firmware R46‑2.4.15‑20250721‑164017 are affected. No other firmware versions or additional products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.1 reflects moderate severity, and the exploit is publicly disclosed on GitHub and VULDB, indicating real-world attack potential. The EPSS score is <1% and the flaw is not present in the CISA KEV catalog, but the remote attack vector and the ability to execute privileged commands elevate the risk for any router exposed to the internet. Immediate attention to mitigating this vulnerability is recommended to prevent compromise.
OpenCVE Enrichment