Cyber Posture

CVE-2026-7833

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.9th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

A weakness has been identified in EFM ipTIME C200 up to 1.092. This vulnerability affects the function sub_408F90 of the file /cgi/iux_set.cgi of the component ApplyRestore Endpoint. This manipulation of the argument RestoreFile causes command injection. The attack can be…

more

initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-74

Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.

addresses: CWE-74

Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.

Security SummaryAI

CVE-2026-7833 is a command injection vulnerability affecting EFM ipTIME C200 router firmware versions up to 1.092. The issue resides in the sub_408F90 function of the /cgi/iux_set.cgi file within the ApplyRestore Endpoint component, where manipulation of the RestoreFile argument enables command injection. Published on 2026-05-05, it is associated with CWEs-74 and CWE-77.

The vulnerability is remotely exploitable over the network with low complexity and no user interaction required, though it demands high privileges (PR:H). An attacker with such access can achieve high impacts on confidentiality, integrity, and availability, earning a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).

Advisories note that the vendor was contacted early regarding disclosure but provided no response, and no patches or mitigations are detailed. An exploit is publicly available, as referenced in reports on GitHub and VULDB.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in public-facing /cgi/iux_set.cgi ApplyRestore endpoint enables remote exploitation of the web interface (T1190) and arbitrary Unix shell command execution on the Linux-based router firmware (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References