CVE-2025-26010

9.8 CRITICAL

📋 TL;DR

CVE-2025-26010 allows unauthenticated attackers to modify administrator passwords on Telesquare TLR-2005KSH routers by exploiting the admin.cgi parameter. This affects all users running vulnerable firmware versions, potentially granting full device control. The vulnerability stems from improper access control in the web interface.

💻 Affected Systems

Products:
  • Telesquare TLR-2005KSH
Versions: 1.1.4 (specific version mentioned; earlier/later versions may also be affected)
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface; default configuration appears vulnerable based on available information.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover, network compromise, credential theft, and persistent backdoor installation leading to data exfiltration or ransomware deployment.

🟠

Likely Case

Unauthorized password change enabling administrative access, allowing configuration changes, network traffic interception, and lateral movement.

🟢

If Mitigated

Limited impact if device is behind strict network segmentation with no internet exposure and strong authentication controls.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface with no authentication required.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be compromised without credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit involves simple HTTP request to admin.cgi with setUserNamePassword parameter; trivial to automate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Monitor Telesquare for security advisory. 2. Apply firmware update when available. 3. Verify fix by testing exploit after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate router management interface from untrusted networks

Access Control Lists

linux

Restrict access to router web interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Replace vulnerable device with supported hardware
  • Implement strict network monitoring and anomaly detection for management interface traffic

🔍 How to Verify

Check if Vulnerable:

Send HTTP POST request to /admin.cgi with setUserNamePassword parameter and observe if password changes without authentication

Check Version:

Check web interface login page or system information page for firmware version

Verify Fix Applied:

Attempt same exploit after applying mitigation; successful authentication should now be required

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /admin.cgi
  • Password change events without prior authentication logs
  • Multiple failed login attempts followed by successful password reset

Network Indicators:

  • HTTP POST to /admin.cgi with setUserNamePassword parameter from unexpected sources
  • Unusual management interface traffic patterns

SIEM Query:

source="router_logs" AND uri="/admin.cgi" AND method="POST" AND params CONTAINS "setUserNamePassword"

🔗 References

📤 Share & Export