CVE-2025-26008

9.8 CRITICAL

📋 TL;DR

An unauthenticated stack overflow vulnerability in Telesquare TLR-2005KSH routers allows remote attackers to execute arbitrary code by sending specially crafted requests to the admin.cgi endpoint with the setSyncTimeHost parameter. This affects all users running version 1.1.4 of the firmware. Attackers can gain complete control of affected devices without authentication.

💻 Affected Systems

Products:
  • Telesquare TLR-2005KSH
Versions: 1.1.4
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network pivoting, credential theft, and botnet recruitment.

🟠

Likely Case

Remote code execution resulting in device takeover, configuration modification, and network surveillance capabilities.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains technical details and proof-of-concept information. Exploitation requires sending a crafted HTTP request to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is currently available. Monitor Telesquare's website for security updates and firmware releases.

🔧 Temporary Workarounds

Block admin.cgi Access

linux

Use firewall rules to block external access to the admin.cgi endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "admin.cgi" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "admin.cgi" --algo bm -j DROP

Network Segmentation

all

Isolate affected devices in separate VLANs with strict access controls

🧯 If You Can't Patch

  • Immediately disconnect affected devices from internet-facing interfaces
  • Implement strict network access controls limiting communication to/from affected devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at System > Firmware Upgrade or via SSH with 'cat /etc/version'

Check Version:

cat /etc/version 2>/dev/null || grep -i version /proc/cpuinfo

Verify Fix Applied:

Verify firmware version is updated beyond 1.1.4 when patch becomes available

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'admin.cgi' with 'setSyncTimeHost' parameter
  • Unusual process execution or system modifications

Network Indicators:

  • HTTP POST requests to /admin.cgi with long parameter values
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (uri="*admin.cgi*" AND param="*setSyncTimeHost*")

🔗 References

📤 Share & Export