CVE-2026-2550
EFM (iptime) · A6004MX
A critical unrestricted file upload vulnerability in the iptime A6004MX router allows remote attackers to execute arbitrary code via the commit_vpncli_file_upload function.
Executive summary
Remote attackers can achieve full system compromise and arbitrary code execution through an unrestricted file upload vulnerability in the iptime A6004MX router's management interface.
Vulnerability
The vulnerability exists within the commit_vpncli_file_upload function in /cgi/timepro.cgi. It allows an unauthenticated or remote attacker to upload arbitrary files to the system without restriction, leading to remote code execution (RCE).
Business impact
The impact of this vulnerability is severe, as reflected in its CVSS score of 9.8. Successful exploitation allows an attacker to take complete control of the router, potentially intercepting all network traffic, pivoting to the internal network, or rendering the device inoperable. This poses a significant threat to organizational data security and business continuity.
Remediation
Immediate Action: Update the iptime A6004MX firmware to the latest available version immediately to patch the vulnerable CGI function.
Proactive Monitoring: Monitor the router's file system and logs for any unexpected files in web-accessible directories or unusual administrative activity.
Compensating Controls: Restrict access to the router's management interface (/cgi/timepro.cgi) to trusted internal IP addresses only and disable remote management features over the WAN.
Exploitation status
Public Exploit Available: true
Analyst recommendation
Given the availability of a public exploit and the high CVSS score, this vulnerability must be remediated with the highest urgency. Administrators should assume that any internet-facing device running version 14.18.2 is currently at risk of compromise and should apply updates or restrictive access controls immediately.