Description
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.
References
iptime.com/...d=126&dfsid=3&dftid=583&uid=25203&mod=document
docs.google.com/...dgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing
github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md
github.com/...55423/assets/affected_products_cve_format.json