जमा करें #741450: EFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Uploadजानकारी

शीर्षकEFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Upload
विवरणA critical security vulnerability exists in the ipTIME router firmware involving the `timepro.cgi` binary. First, an **Authentication Bypass** vulnerability allows unauthenticated attackers to access sensitive CGI functions by utilizing the `/cgi/` URL path instead of the standard `/sess-bin/` path. This bypasses the session validation logic in the `ftext` dispatcher. Second, an **Arbitrary File Upload** vulnerability exists in the `commit_vpncli_file_upload` function. The function fails to properly validate the file extension or file content. This allows an attacker to successfully upload an arbitrary OpenVPN configuration file (`.ovpn`) directly to the system directory `/etc/econf/vpnclient/openvpn/`. By uploading a malicious OpenVPN configuration file containing the `script-security 2` and `up` directives, an attacker can trigger the execution of arbitrary system commands with `root` privileges when the VPN service is invoked.
स्रोत⚠️ https://github.com/LX-LX88/cve/issues/29
उपयोगकर्ता
 LX-LX (UID 91683)
सबमिशन17/01/2026 04:28 PM (3 महीनों पहले)
संयम01/02/2026 09:06 AM (15 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि343641 [EFM ipTIME A8004T 14.18.2 VPN Service /cgi/timepro.cgi commit_vpncli_file_upload अधिकार वृद्धि]
अंक20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!