CVE-2026-8234
Received Received - Intake
Stack-Based Buffer Overflow in ipTIME A8004T Router

Publication date: 2026-05-10

Last updated on: 2026-05-10

Assigner: VulDB

Description
A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-10
Last Modified
2026-05-10
Generated
2026-05-10
AI Q&A
2026-05-10
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
efm iptime_a8004t 14.18.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8234 is a security vulnerability in the ipTIME Router A8004T version 14.18.2. It exists in the function formWifiBasicSet, specifically in the handling of the security_5g parameter in the /goform/WifiBasicSet endpoint. The vulnerability is a stack-based buffer overflow caused by the use of the unsafe strcpy function to copy user input into a fixed-size buffer without proper size validation.

An attacker can send an oversized input remotely to this parameter, which can overwrite adjacent memory, potentially causing application crashes, memory corruption, or arbitrary code execution.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including denial of service, information leakage, and full device takeover. Exploiting the buffer overflow can lead to crashes or allow attackers to execute arbitrary code on the device.

Because the exploit can be initiated remotely without authentication, attackers can compromise device stability, data confidentiality, and overall system security.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unusual POST requests to the endpoint /goform/WifiBasicSet that include an oversized security_5g parameter. Since exploitation involves sending a maliciously large payload to this endpoint, network traffic inspection tools or intrusion detection systems can be configured to flag POST requests with unusually large security_5g parameters.

A practical approach is to use command-line tools like curl or Python scripts to test the endpoint with oversized input and observe the device's response or stability.

  • Example curl command to test the vulnerability by sending a large security_5g parameter payload: curl -X POST http://<router-ip>/goform/WifiBasicSet -d "security_5g=$(python3 -c 'print("A"*300)')"
  • Use network monitoring tools (e.g., tcpdump or Wireshark) to capture and analyze POST requests to /goform/WifiBasicSet for abnormally large security_5g parameters.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoint and limiting exposure of the device to untrusted networks.

Specifically, you should:

  • Apply network-level controls such as firewall rules to block or restrict incoming POST requests to /goform/WifiBasicSet from untrusted sources.
  • Disable remote management or access to the router's web interface if not necessary.
  • Monitor the device for signs of exploitation such as crashes or unusual behavior.
  • If possible, update the device firmware to a version that addresses this vulnerability or contact the vendor for patches or guidance.

Additionally, adopting secure coding practices and input validation as recommended by the vendor or security community will help prevent similar issues in the future.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the ipTIME A8004T router allows remote attackers to cause buffer overflow, potentially leading to arbitrary code execution, denial of service, and information leakage. Such impacts on data confidentiality, integrity, and availability can negatively affect compliance with standards like GDPR and HIPAA, which require protection of sensitive data and system security.

Specifically, the risk of information leakage and full device takeover could lead to unauthorized access to personal or protected health information, violating data protection requirements under these regulations.

Therefore, organizations using affected devices without mitigation may face compliance challenges related to safeguarding data privacy and ensuring system security.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart