Impact
The vulnerability resides in the action_ipsec_conn function of /usr/bin/lib/lua/luci/controller/ipsec.lua on Cudy TR1200 routers, allowing an attacker to inject arbitrary shell commands. The injected commands execute with the privileges of the router’s internal script engine, potentially resulting in full device takeover. This flaw is classified as CWE‑74 (Command Injection) and CWE‑77 (Improper Output Escaping).
Affected Systems
Cudy TR1200 routers running firmware R46‑2.4.15‑20250721‑164017 are affected. No other firmware versions or additional products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.1 reflects moderate severity, and the exploit is publicly disclosed on GitHub and VULDB, indicating real-world attack potential. The EPSS score is unavailable and the flaw is not present in the CISA KEV catalog, but the remote attack vector and the ability to execute privileged commands elevate the risk for any router exposed to the internet. Immediate attention to mitigating this vulnerability is recommended to prevent compromise.
OpenCVE Enrichment