CVE-2025-20617

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with administrative access to execute arbitrary operating system commands on UD-LT2 devices. Attackers can exploit this by manipulating requests on a specific screen operation after logging in with admin credentials. This affects UD-LT2 firmware versions 1.00.008_SE and earlier.

💻 Affected Systems

Products:
  • I-O DATA UD-LT2
Versions: Ver.1.00.008_SE and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative account access to exploit. This affects a different screen operation than the related CVE-2025-26856 vulnerability.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive data, pivot to other network systems, or render the device unusable.

🟠

Likely Case

Attackers with stolen or compromised admin credentials execute commands to gain persistent access, modify device configurations, or disrupt operations.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device only, preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative credentials and knowledge of the vulnerable screen operation. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version newer than 1.00.008_SE

Vendor Advisory: https://www.iodata.jp/support/information/2025/01_ud-lt2/

Restart Required: No

Instructions:

1. Visit the I-O DATA support page. 2. Download the latest firmware for UD-LT2. 3. Follow the vendor's firmware update procedure. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative account access to only trusted personnel and implement strong password policies.

Network Segmentation

all

Isolate UD-LT2 devices on separate network segments to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict access controls for administrative accounts with multi-factor authentication where possible.
  • Monitor network traffic to/from UD-LT2 devices for unusual command patterns or connections.

🔍 How to Verify

Check if Vulnerable:

Check the firmware version in the device's web interface or administration panel.

Check Version:

Check via device web interface: System > Firmware Information

Verify Fix Applied:

After updating, verify the firmware version shows a version newer than 1.00.008_SE.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login attempts
  • Unexpected command execution patterns in system logs
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unusual outbound connections from UD-LT2 device
  • Traffic patterns suggesting command execution

SIEM Query:

source="ud-lt2" AND (event_type="admin_login" OR command_execution="*" OR failed_login>3)

🔗 References

📤 Share & Export