Home

Description

A vulnerability was determined in EFM ipTIME A8004T 14.18.2. Affected is the function httpcon_check_session_url of the file /sess-bin/d.cgi of the component Debug Interface. This manipulation of the argument cmd causes backdoor. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-02-01 | Published 2026-02-02 | Updated 2026-02-23 | Assigner VulDB




HIGH: 7.5CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.6CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
MEDIUM: 6.6CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
6.8AV:N/AC:H/Au:M/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Backdoor

Product status

14.18.2
affected

Timeline

2026-02-01:Advisory disclosed
2026-02-01:VulDB entry created
2026-02-02:VulDB entry last update

Credits

LX-LX (VulDB User) reporter

References

vuldb.com/?id.343640 (VDB-343640 | EFM ipTIME A8004T Debug d.cgi httpcon_check_session_url backdoor) vdb-entry technical-description

vuldb.com/?ctiid.343640 (VDB-343640 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.741423 (Submit #741423 | EFM IPTIME A8004T 14.18.2 Command Injection) third-party-advisory

github.com/LX-LX88/cve/issues/28 broken-link exploit issue-tracking

cve.org (CVE-2026-1741)

nvd.nist.gov (CVE-2026-1741)

Download JSON