Submit #741450: EFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Uploadinfo

TitleEFM IPTIME A8004T 14.18.2 Authentication Bypass & Arbitrary File Upload
DescriptionA critical security vulnerability exists in the ipTIME router firmware involving the `timepro.cgi` binary. First, an **Authentication Bypass** vulnerability allows unauthenticated attackers to access sensitive CGI functions by utilizing the `/cgi/` URL path instead of the standard `/sess-bin/` path. This bypasses the session validation logic in the `ftext` dispatcher. Second, an **Arbitrary File Upload** vulnerability exists in the `commit_vpncli_file_upload` function. The function fails to properly validate the file extension or file content. This allows an attacker to successfully upload an arbitrary OpenVPN configuration file (`.ovpn`) directly to the system directory `/etc/econf/vpnclient/openvpn/`. By uploading a malicious OpenVPN configuration file containing the `script-security 2` and `up` directives, an attacker can trigger the execution of arbitrary system commands with `root` privileges when the VPN service is invoked.
Source⚠️ https://github.com/LX-LX88/cve/issues/29
User
 LX-LX (UID 91683)
Submission01/17/2026 16:28 (3 months ago)
Moderation02/01/2026 09:06 (15 days later)
StatusAccepted
VulDB entry343641 [EFM ipTIME A8004T 14.18.2 VPN Service /cgi/timepro.cgi commit_vpncli_file_upload unrestricted upload]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!