Skip to content
CVSS 7.2 · HIGH

CVE-2026-7833

A weakness has been identified in EFM ipTIME C200 up to 1.092. This vulnerability affects the function sub_408F90 of the file /cgi/iux_set.cgi of the component ApplyRestore Endpoint. This manipulation of the argument RestoreFile causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Ver en NVD

Análisis

This vulnerability affects a specific model of ipTIME IP cameras, which is consumer-grade IoT hardware with very low deployment in Mexico and the MexicoDev target community. While a public exploit exists for this command injection, the niche nature of the product makes it less relevant for a general developer feed.

Severidad

Puntaje: 7.2(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: HIGH
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-74CWE-77

EPSS

Probabilidad de explotación (próx. 30 días): 0.0012 (0.1%)
Percentil: 30.9%
EPSS: 2026-05-06

Descripción técnica

A weakness has been identified in EFM ipTIME C200 up to 1.092. This vulnerability affects the function sub_408F90 of the file /cgi/iux_set.cgi of the component ApplyRestore Endpoint. This manipulation of the argument RestoreFile causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Publicada: 5/5/2026, 13:16:31
Última modificación: 5/5/2026, 19:09:32

Referencias

InicioEventosBlogRecursosEquipo