CVE-2025-55423
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.
Analysis
Multiple ipTIME router models have a command injection vulnerability in the upnp_relay() function, allowing remote attackers to execute arbitrary OS commands through crafted UPnP requests.
Technical Context
The upnp_relay() function in multiple ipTIME routers fails to sanitize UPnP control messages (CWE-94), allowing attackers to inject OS commands through crafted UPnP requests processed by the router.
Affected Products
['Multiple ipTIME router models']
Remediation
Update router firmware. Disable UPnP if not needed. ipTIME routers should be checked for firmware updates regularly.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today