CVE-2025-26002

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Telesquare TLR-2005KSH routers by exploiting a buffer overflow in the admin.cgi endpoint. Attackers can gain full control of affected devices, potentially compromising network security. Only Telesquare TLR-2005KSH routers running version 1.1.4 are affected.

💻 Affected Systems

Products:
  • Telesquare TLR-2005KSH
Versions: 1.1.4
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The admin.cgi endpoint appears to be enabled by default in affected firmware versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to network pivoting, data exfiltration, and persistent backdoor installation across the network.

🟠

Likely Case

Remote code execution allowing attackers to modify configurations, intercept traffic, or use the device as a foothold for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Directly exploitable over the internet without authentication, making exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network-adjacent attacker.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public GitHub repositories contain proof-of-concept code demonstrating exploitation. The vulnerability requires no authentication and has a simple exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is currently available. Monitor Telesquare's security advisories for updates.

🔧 Temporary Workarounds

Block admin.cgi Access

linux

Use firewall rules to block access to the vulnerable admin.cgi endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "admin.cgi" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "admin.cgi" --algo bm -j DROP

Disable Web Interface

all

Disable the router's web management interface if not required

🧯 If You Can't Patch

  • Isolate affected routers in a dedicated VLAN with strict network segmentation
  • Implement strict firewall rules to only allow necessary traffic to/from the devices

🔍 How to Verify

Check if Vulnerable:

Check if the router responds to requests to /admin.cgi with setSyncTimeHost parameter containing overly long input

Check Version:

Check web interface or use SNMP to query system version information

Verify Fix Applied:

Test if the buffer overflow condition still exists by attempting to trigger the vulnerability with safe testing methods

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed or successful requests to admin.cgi with long parameter values
  • Unusual process execution or system modifications

Network Indicators:

  • HTTP requests containing 'admin.cgi' with 'setSyncTimeHost' parameter exceeding normal length
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (uri="*admin.cgi*" AND param="*setSyncTimeHost*") | stats count by src_ip

🔗 References

📤 Share & Export