Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-2550 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unrestricted file upload in `commit_vpncli_file_upload` function within `/cgi/timepro.cgi`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The code fails to validate or restrict the type/size of files uploaded via the VPN client configuration interface.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **EFM iptime A6004MX** (Wireless Router). πŸ“Œ **Version**: Specifically **14.18.2**. 🌍 **Vendor**: EFM (South Korea).

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Remote, No Authentication required (PR:N). πŸ“‚ **Data**: High impact on Confidentiality, Integrity, and Availability (C:H, I:H, A:H). Attackers can execute arbitrary code on the router.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. CVSS Vector `AV:N/AC:L/PR:N/UI:N` indicates it is **Network-accessible**, **Low Complexity**, requires **No Privileges**, and **No User Interaction**. Easy to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit Status**: Public references exist (VDB-346159, GitHub issues).…

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for the specific CGI endpoint `/cgi/timepro.cgi`. Look for the `commit_vpncli_file_upload` parameter. Check if the router version is **14.18.2**.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Official patch details are not explicitly provided in the data. However, vendors typically release firmware updates. Check EFM's official support page for newer firmware versions for A6004MX.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If no patch is available: 1. **Disable** remote management if possible. 2. **Restrict** access to the management interface via firewall rules. 3.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **CRITICAL**. CVSS Score is **9.8** (High). Due to remote exploitability without auth, immediate action is required. Prioritize patching or applying network-level mitigations.