No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 06 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Iptime
Iptime c200 |
|
| Vendors & Products |
Iptime
Iptime c200 |
Tue, 05 May 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in EFM ipTIME C200 up to 1.092. This vulnerability affects the function sub_408F90 of the file /cgi/iux_set.cgi of the component ApplyRestore Endpoint. This manipulation of the argument RestoreFile causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | EFM ipTIME C200 ApplyRestore Endpoint iux_set.cgi sub_408F90 command injection | |
| Weaknesses | CWE-74 CWE-77 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-06T12:38:32.806Z
Reserved: 2026-05-05T06:33:49.481Z
Link: CVE-2026-7833
Updated: 2026-05-06T12:38:29.764Z
Status : Deferred
Published: 2026-05-05T13:16:31.413
Modified: 2026-05-05T19:09:32.000
Link: CVE-2026-7833
No data.
OpenCVE Enrichment
Updated: 2026-05-05T21:30:05Z