CVE-2025-26856

7.2 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in UD-LT2 firmware that allows authenticated attackers with administrative privileges to execute arbitrary operating system commands. The vulnerability affects UD-LT2 devices running firmware version 1.00.008_SE and earlier. Attackers can exploit this by manipulating requests on a specific screen operation after logging in with admin credentials.

💻 Affected Systems

Products:
  • IODATA UD-LT2
Versions: Ver.1.00.008_SE and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative account access to exploit. This is a different screen operation from the previously reported CVE-2025-20617.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands with root/system privileges, potentially leading to complete device takeover, data exfiltration, or use as a pivot point in the network.

🟠

Likely Case

Authenticated attacker with admin access executes commands to modify device configuration, install backdoors, or disrupt device functionality.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected device only, preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative credentials and knowledge of the vulnerable screen operation. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version newer than 1.00.008_SE

Vendor Advisory: https://www.iodata.jp/support/information/2025/01_ud-lt2/

Restart Required: No

Instructions:

1. Visit the IODATA support page for UD-LT2. 2. Download the latest firmware version. 3. Follow the vendor's firmware update procedure. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative account access to only trusted users and implement strong password policies.

Network Segmentation

all

Isolate UD-LT2 devices on separate network segments to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict access controls and monitor administrative account usage
  • Deploy network-based intrusion detection systems to monitor for command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface or SSH if enabled. Navigate to System Information or similar menu.

Check Version:

Check via web interface at System > Firmware Information or similar menu path

Verify Fix Applied:

Verify firmware version is newer than 1.00.008_SE after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Unexpected command execution in system logs
  • Multiple failed login attempts followed by successful admin login

Network Indicators:

  • Unusual outbound connections from UD-LT2 device
  • Traffic patterns suggesting command and control communication

SIEM Query:

source="ud-lt2-logs" AND (event_type="admin_login" OR command_execution="*" OR failed_login>3)

🔗 References

📤 Share & Export