제출 #741450: EFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Upload정보

제목EFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Upload
설명A critical security vulnerability exists in the ipTIME router firmware involving the `timepro.cgi` binary. First, an **Authentication Bypass** vulnerability allows unauthenticated attackers to access sensitive CGI functions by utilizing the `/cgi/` URL path instead of the standard `/sess-bin/` path. This bypasses the session validation logic in the `ftext` dispatcher. Second, an **Arbitrary File Upload** vulnerability exists in the `commit_vpncli_file_upload` function. The function fails to properly validate the file extension or file content. This allows an attacker to successfully upload an arbitrary OpenVPN configuration file (`.ovpn`) directly to the system directory `/etc/econf/vpnclient/openvpn/`. By uploading a malicious OpenVPN configuration file containing the `script-security 2` and `up` directives, an attacker can trigger the execution of arbitrary system commands with `root` privileges when the VPN service is invoked.
원천⚠️ https://github.com/LX-LX88/cve/issues/29
사용자
 LX-LX (UID 91683)
제출2026. 01. 17. PM 04:28 (3 개월 ago)
모더레이션2026. 02. 01. AM 09:06 (15 days later)
상태수락
VulDB 항목343641 [EFM ipTIME A8004T 14.18.2 VPN Service /cgi/timepro.cgi commit_vpncli_file_upload 권한 상승]
포인트들20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!