Description
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.
References (4)
Core 4
Core References
Third Party Advisory
https://docs.google.com/spreadsheets/d/1kryOFltCmnPJvDTpIrudgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing
Exploit, Third Party Advisory
https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md
Scores
CVSS v3
9.8
EPSS
0.0058
EPSS Percentile
69.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-94
Status
published
Products (50)
iptime/a1004_firmware
9.90.8 - 12.16.2
iptime/a1004ns_firmware
9.96.0 - 12.16.2
iptime/a1004v_firmware
9.90.8 - 12.16.2
iptime/a104_firmware
9.90.8 - 10.03.8
iptime/a104ns_firmware
9.96.0 - 12.16.2
iptime/a104r_firmware
iptime/a104r_firmware
9.90.8 - 10.07.4
iptime/a1_firmware
9.96.8 - 10.07.4
iptime/a2003mu_firmware
12.13.0 - 12.16.2
iptime/a2003ns-mu_firmware
10.00.6 - 12.16.2
... and 40 more
Published
Jan 20, 2026
Tracked Since
Feb 18, 2026