CVE-2025-55423

9.8 CRITICAL

📋 TL;DR

A critical command injection vulnerability in ipTIME routers allows attackers to execute arbitrary operating system commands by injecting malicious input into the controlURL parameter during UPnP port-forwarding operations. This affects multiple ipTIME router models and can be exploited remotely without authentication. The vulnerability enables complete device compromise and potential network infiltration.

💻 Affected Systems

Products:
  • Multiple ipTIME router models (specific models listed in vendor advisory)
Versions: Multiple firmware versions prior to vendor patch
Operating Systems: Embedded Linux-based router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects routers with UPnP enabled (typically default). Exact model list available in vendor advisory and GitHub references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full router compromise leading to complete network takeover, credential theft, malware deployment, and persistent backdoor installation across all connected devices.

🟠

Likely Case

Router compromise allowing attackers to intercept network traffic, modify DNS settings, deploy ransomware, and pivot to internal systems.

🟢

If Mitigated

Limited impact if network segmentation isolates routers and strict firewall rules prevent external access to UPnP services.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with UPnP enabled by default, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they gain network access, but external exploitation is more likely.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available on GitHub. Exploitation requires sending specially crafted UPnP requests to vulnerable routers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched firmware versions

Vendor Advisory: https://iptime.com/iptime/?pageid=4&page_id=126&dfsid=3&dftid=583&uid=25203&mod=document

Restart Required: Yes

Instructions:

1. Visit vendor advisory URL 2. Identify your router model 3. Download latest firmware 4. Log into router admin interface 5. Navigate to firmware update section 6. Upload and apply new firmware 7. Reboot router

🔧 Temporary Workarounds

Disable UPnP

all

Disable Universal Plug and Play functionality to prevent exploitation vector

Login to router admin panel -> Advanced Settings -> UPnP -> Disable

Network Segmentation

all

Isolate routers from critical internal networks

🧯 If You Can't Patch

  • Implement strict firewall rules to block external access to UPnP ports (typically 1900/udp and 5000/tcp)
  • Deploy network intrusion detection systems to monitor for UPnP exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check router firmware version against vendor advisory. Test by sending crafted UPnP request to controlURL parameter and observing system command execution.

Check Version:

Login to router web interface -> System Information -> Firmware Version

Verify Fix Applied:

Verify firmware version matches patched version from vendor. Test that UPnP requests with command injection payloads no longer execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual UPnP requests in router logs
  • System command execution from UPnP process
  • Failed authentication attempts to router admin

Network Indicators:

  • Unusual outbound connections from router
  • DNS changes from router
  • Port scanning originating from router

SIEM Query:

source="router_logs" AND ("UPnP" OR "controlURL") AND ("system(" OR "exec(" OR "popen(")

🔗 References

📤 Share & Export