CVE-2026-2550

EFM (iptime) · A6004MX

A critical unrestricted file upload vulnerability in the iptime A6004MX router allows remote attackers to execute arbitrary code via the commit_vpncli_file_upload function.

Executive summary

Remote attackers can achieve full system compromise and arbitrary code execution through an unrestricted file upload vulnerability in the iptime A6004MX router's management interface.

Vulnerability

The vulnerability exists within the commit_vpncli_file_upload function in /cgi/timepro.cgi. It allows an unauthenticated or remote attacker to upload arbitrary files to the system without restriction, leading to remote code execution (RCE).

Business impact

The impact of this vulnerability is severe, as reflected in its CVSS score of 9.8. Successful exploitation allows an attacker to take complete control of the router, potentially intercepting all network traffic, pivoting to the internal network, or rendering the device inoperable. This poses a significant threat to organizational data security and business continuity.

Remediation

Immediate Action: Update the iptime A6004MX firmware to the latest available version immediately to patch the vulnerable CGI function.

Proactive Monitoring: Monitor the router's file system and logs for any unexpected files in web-accessible directories or unusual administrative activity.

Compensating Controls: Restrict access to the router's management interface (/cgi/timepro.cgi) to trusted internal IP addresses only and disable remote management features over the WAN.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the availability of a public exploit and the high CVSS score, this vulnerability must be remediated with the highest urgency. Administrators should assume that any internet-facing device running version 14.18.2 is currently at risk of compromise and should apply updates or restrictive access controls immediately.