Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

iptime

Source -

NVD

BOS Name -

N/A

CNA CVEs -

0

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

13
Related CVEsRelated ProductsRelated AssignersReports
13Vulnerabilities found

CVE-2026-24498
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-6||MEDIUM
EPSS-0.08% / 24.22%
||
7 Day CHG~0.00%
Published-27 Feb, 2026 | 02:01
Updated-17 Mar, 2026 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in EFM-Networks, Inc. IpTIME T5008, EFM-Networks, Inc. IpTIME AX2004M, EFM-Networks, Inc. IpTIME AX3000Q, EFM-Networks, Inc. IpTIME AX6000M allows Authentication Bypass.This issue affects ipTIME T5008: through 15.26.8; ipTIME AX2004M: through 15.26.8; ipTIME AX3000Q: through 15.26.8; ipTIME AX6000M: through 15.26.8.

Action-Not Available
Vendor-iptimeEFM-Networks, Inc.
Product-ax3000qax6000m_firmwareax6000max3000q_firmwareax2004m_firmwareax2004mt5008_firmwaret5008ipTIME AX6000MipTIME AX2004MipTIME AX3000QipTIME T5008
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2026-1742
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-5.1||MEDIUM
EPSS-0.01% / 2.44%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 03:32
Updated-10 Mar, 2026 | 18:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EFM ipTIME A8004T VPN Service timepro.cgi commit_vpncli_file_upload unrestricted upload

A vulnerability was identified in EFM ipTIME A8004T 14.18.2. Affected by this vulnerability is the function commit_vpncli_file_upload of the file /cgi/timepro.cgi of the component VPN Service. Such manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-iptimeEFM
Product-a8004t_firmwarea8004tipTIME A8004T
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2026-1741
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.64%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 03:02
Updated-10 Mar, 2026 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EFM ipTIME A8004T Debug d.cgi httpcon_check_session_url backdoor

A vulnerability was determined in EFM ipTIME A8004T 14.18.2. Affected is the function httpcon_check_session_url of the file /sess-bin/d.cgi of the component Debug Interface. This manipulation of the argument cmd causes backdoor. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-iptimeEFM
Product-a8004t_firmwarea8004tipTIME A8004T
CWE ID-CWE-912
Hidden Functionality
CVE-2026-1740
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.10% / 26.51%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 02:32
Updated-10 Mar, 2026 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EFM ipTIME A8004T Hidden Hiddenloginsetup timepro.cgi httpcon_check_session_url improper authentication

A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-iptimeEFM
Product-a8004t_firmwarea8004tipTIME A8004T
CWE ID-CWE-287
Improper Authentication
CVE-2025-55423
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 68.95%
||
7 Day CHG~0.00%
Published-20 Jan, 2026 | 00:00
Updated-30 Jan, 2026 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.

Action-Not Available
Vendor-iptimen/a
Product-n2en604tplus_firmwarev304n2plusa5004ns_firmwaren2plus-i_firmwaren3-i_firmwaren604en600q504n2vsn600_firmwarea2004sea7004m_firmwaren102iplusn604a_firmwaren8004v_firmwaren604an904ns_firmwarea604-v3_firmwaren804ta3004ns-m_firmwaren604eplus_firmwarea2003mua6004mx_firmwareax3004bcm_firmwaren604ra6004ns-mn8004rn7004nsa2004nsplusn604plus-ia1004_firmwarea604ra6ns-m_firmwarea604sea3004tv304_firmwarea9004mn704nst5004_firmwaren702e_firmwaret16000mn604t_firmwareax3004itl_firmwaren602se_firmwareax2004mn804an904vsmartn704qcaa2004ns-rn704-a3n104_blackn104en702en5_firmwareax8008ma604-v5_firmwaren804t3n804a3_firmwarea3003nsa3004-dual_firmwareq604a3004mn904plusn904plus_firmwaren702bcmn804v_firmwareax2004_firmwarea8004tt24000m_firmwarea804ns-mun104v_firmwaren904v_firmwaren804t_firmwareax11000_firmwaren704e_firmwaren2v_firmwaren1plus_firmwarea104ax2004bcm_firmwarea304_firmwaret3004a9004m_firmwaret16000_firmwaren704v3n804rn2plus-in604_blacka604-v3n104r_firmwaren602sen1e_firmwarea3004ns-dual_firmwarea5004ns-m_firmwaren602eplusa2004rn104va2004ns-mu_firmwarea3004twa104ns_firmwarea8ns-mt16000m_firmwareax2002meshn602e_firmwarea104rn604e_firmwaren1plus-i_firmwarea5004ns-mn602eplus_firmwarea1004a604va1004vn704bcm_firmwareax3004itla7ns_firmwaren904a604g-mun604plus-i_firmwaren104s-r1_firmwarea3004nssmart_firmwaren804va2004mu_firmwaren2vs_firmwarea3004ns-mn702r_firmwaren804a3a104nsax8004bcm_firmwarea3004tw_firmwarea5004nsa3004ns-bcma2004nsplus_firmwarea3004ns-bcm_firmwarea6004ns-m_firmwaren704qca_firmwaren102in6n104e_firmwarea604g-mu_firmwaren104q-in1v_firmwaren8004r_firmwarea3004m_firmwaren604rplus_firmwaren704eplusa8004t-xrn6004rn2e_firmwaren904_firmwarea2003ns-mu_firmwarea2004nst3004_firmwarea2004a9004m-x2_firmwarea604n702bcm_firmwareax2002mesh_firmwaren3_firmwarea604r_firmwarea8004ns-mn702eplus_firmwaren104_black_firmwaren604seew302n_firmwarea3004ns_firmwaren604sa7004mt5008_firmwarea3004ns-dualn702ra2004plus_firmwaren102eplusn104qa604m_firmwarea1n1en102eplus_firmwaren604vplusq1_firmwarea604muax8004m_firmwareax8004bcmn104plus-ia2004r_firmwaren5n604tplust3008a104_firmwaren104eplusn1plus-ia604ma2004se_firmwarev504_firmwarea604g-skylifen604eplusn104rt24000_firmwaren704-a3_firmwareq604_firmwaren704v3_firmwaren804t3_firmwarea2004mun604s_firmwaret16000q1ax2004m_firmwareax11000n604vplus_firmwaret3008_firmwarea104r_firmwaren604vn2eplusn104q_firmwarea3002mesh_firmwarea3008-mu_firmwaren604se_firmwaren604_black_firmwaren2va2004_firmwarea6004nsn6_firmwaren704en6004r_firmwaren104k_firmwarea3004n604rplus-in804a_firmwarea8004bcmn2eplus_firmwaren102e_firmwarea2004ns-mun604rplusa8004itlq304q304_firmwaren804_firmwarea604_firmwaren102iplus_firmwaren104ka3004_firmwaren7004ns_firmwarea2004ns-r_firmwarea1_firmwarea704ns-bcm_firmwarea2004ns_firmwarea1004ns_firmwaren5-ia8004bcm_firmwarea6ns-mn604rplus-i_firmwarea704ns-bcmn104plusa3003ns_firmwarea604v_firmwarea6004ns_firmwaren804a304n804r_firmwaren3-ia8004itl_firmwarea1004v_firmwarea604mu_firmwarea604g-skylife_firmwarev508a3008-muax2004bcmt24000mt5008a2008_firmwarea8004t-xr_firmwarea804ns-mu_firmwarea3002mesht24000ax8008m_firmwarea1004nsa3004-duala8004t_firmwarea6004mxt5004ew302nn104s-r1n602en904nsv504a9004m-x2n604plus_firmwarea8004ns-m_firmwarea3_firmwaren102en104plus_firmwarea2004plusn104plus-i_firmwaren104q-i_firmwaren604r_firmwarea604-v5a3004t_firmwaren704ns_firmwaren8004vn1plusn104eplus_firmwaren102i_firmwarev508_firmwaren604v_firmwaren702eplusn3ax3004bcmn704bcma2003mu_firmwareax2004a3ax8004mq504_firmwarea2003ns-mun704eplus_firmwaren604plusn1va604se_firmwarea8ns-m_firmwaren2plus_firmwaren5-i_firmwarea2008n604ta7nsn/a
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2025-50464
Assigner-MITRE Corporation
ShareView Details
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.11% / 29.71%
||
7 Day CHG+0.01%
Published-30 Jul, 2025 | 00:00
Updated-06 Aug, 2025 | 16:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability exists in the upload.cgi module of the iptime NAS firmware v1.5.04. The vulnerability arises due to the unsafe use of the strcpy function to copy attacker-controlled data from the CONTENT_TYPE HTTP header into a fixed-size stack buffer (v8, allocated 8 bytes) without bounds checking. Since this operation occurs before authentication logic is executed, the vulnerability is exploitable pre-authentication.

Action-Not Available
Vendor-iptimen/a
Product-nasnas_firmwaren/a
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2022-23771
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-8||HIGH
EPSS-0.14% / 34.31%
||
7 Day CHG~0.00%
Published-17 Oct, 2022 | 00:00
Updated-09 May, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IPTIME NAS1DUAL CSRF Vulnerability

This vulnerability occurs in user accounts creation and deleteion related pages of IPTIME NAS products. The vulnerability could be exploited by a lack of validation when a POST request is made to this page. An attacker can use this vulnerability to or delete user accounts, or to escalate arbitrary user privileges.

Action-Not Available
Vendor-iptimeEFM Networks Co., Ltd
Product-nas1dualnas4dualnas4dual_firmwarenas2dual_firmwarenas1dual_firmwarenas2dualNAS1dual, NAS2dual, NAS4dual
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2022-23765
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-8||HIGH
EPSS-0.22% / 44.60%
||
7 Day CHG~0.00%
Published-17 Aug, 2022 | 20:24
Updated-03 Aug, 2024 | 03:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IPTIME NAS family CSRF vulnerability

This vulnerability occured by sending a malicious POST request to a specific page while logged in random user from some family of IPTIME NAS. Remote attackers can steal root privileges by changing the password of the root through a POST request.

Action-Not Available
Vendor-iptimeEFM Networks Co.,Ltd
Product-nas1dualnas4dualnas4dual_firmwarenas2dual_firmwarenas1dual_firmwarenas2dualNAS1dual, NAS2dual, NAS4dual
CWE ID-CWE-352
Cross-Site Request Forgery (CSRF)
CVE-2021-26620
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.78%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:02
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IPTIME NAS2dual improper authentication vulnerability

An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.

Action-Not Available
Vendor-iptimeEFM Networks Co., Ltd
Product-nas1dualnas3nas101nas4dualnas4_firmwarenas1dual_firmwarenas2dual_firmwarenas101_firmwarenas3_firmwarenas-iienas2dualnas-ii_firmwarenas-i_firmwarenas-inas4dual_firmwarenas-iinas-iie_firmwarenas4ipTIME NAS product (NAS1, 2, 3, 4, 1dual, 2dual 4dual)
CWE ID-CWE-287
Improper Authentication
CVE-2020-7879
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.81% / 74.18%
||
7 Day CHG~0.00%
Published-30 Nov, 2021 | 18:37
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ipTIME C200 IP Camera command injection vulnerability

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.

Action-Not Available
Vendor-iptimeEFM networks & multimedia
Product-c200c200_firmwareipTIME C200 IP Camera
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-26614
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-2.13% / 84.19%
||
7 Day CHG~0.00%
Published-22 Nov, 2021 | 14:38
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IpTime C200 IP camera remote code execution vulnerability

ius_get.cgi in IpTime C200 camera allows remote code execution. A remote attacker may send a crafted parameters to the exposed vulnerable web service interface which invokes the arbitrary shell command.

Action-Not Available
Vendor-iptimeEFM networks & multimedia
Product-c200c200_firmwareipTIME C200 IP Camera
CWE ID-CWE-749
Exposed Dangerous Method or Function
CVE-2020-7847
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-7.4||HIGH
EPSS-0.27% / 50.20%
||
7 Day CHG~0.00%
Published-23 Feb, 2021 | 15:39
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ipTIME NAS product allows an arbitrary file upload vulnerability in the Manage Bulletins/Upload feature, which can be leveraged to gain remote code execution. This issue affects: pTIME NAS 1.4.36.

Action-Not Available
Vendor-iptimeEFM Networks
Product-nas1dualnas3nas101nas4dualnas4_firmwarenas2dual_firmwarenas101_firmwarenas3_firmwarenas-iienas2dualnas-ii_firmwarenas-i_firmwarenas-inas4dual_firmwarenas-iie_firmwarenas-iinas1dual_firmwarenas4ipTIME NAS
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2020-7848
Assigner-KrCERT/CC
ShareView Details
Assigner-KrCERT/CC
CVSS Score-8||HIGH
EPSS-2.89% / 86.34%
||
7 Day CHG~0.00%
Published-17 Feb, 2021 | 13:29
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The EFM ipTIME C200 IP Camera is affected by a Command Injection vulnerability in /login.cgi?logout=1 script. To exploit this vulnerability, an attacker can send a GET request that executes arbitrary OS commands via cookie value.

Action-Not Available
Vendor-iptimeEFM networks & multimedia
Product-c200c200_firmwareipTIME C200 IP Camera
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')