Impact
A code execution flaw exists in the sub_408F90 function of /cgi/iux_set.cgi on EFM ipTIME C200 devices running firmware up to version 1.092. An attacker can supply a crafted value to the RestoreFile argument, causing the device to execute arbitrary shell commands. The vulnerability is a classic command injection weakness (CWE-74) and may also allow path traversal (CWE-77). The exploit is disseminated publicly and an attacker can leverage it to gain remote control of the device, potentially compromising network integrity and confidentiality.
Affected Systems
The issue surfaces on all EFM ipTIME C200 routers with firmware 1.092 or earlier. No newer firmware versions are listed as vulnerable in the CVE record.
Risk and Exploitability
The CVSS score of 8.6 reflects a high severity vulnerability that allows remote code execution without authentication. EPSS data is not available, making it unclear how likely an attacker is to target this specific device, but the publicly shared exploit and the lack of vendor response suggest a real threat. The flaw is not listed in the CISA KEV catalog, indicating it has not yet been widely observed in the wild, but the presence of a ready‑to‑use exploit means it could be adopted quickly.
OpenCVE Enrichment