CVE-2025-55423
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
20/01/2026
Last modified:
30/01/2026
Description
A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:iptime:n104s-r1_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.02.2 (including) |
| cpe:2.3:h:iptime:n104s-r1:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n104v_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.06.8 (including) |
| cpe:2.3:h:iptime:n104v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n1e_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.06.8 (including) |
| cpe:2.3:h:iptime:n1e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n1plus_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.06.8 (including) |
| cpe:2.3:h:iptime:n1plus:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n1plus-i_firmware:*:*:*:*:*:*:*:* | 9.99.6 (including) | 10.06.8 (including) |
| cpe:2.3:h:iptime:n1plus-i:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n1v_firmware:*:*:*:*:*:*:*:* | 11.01.2 (including) | 12.07.6 (including) |
| cpe:2.3:h:iptime:n1v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n2e_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.06.8 (including) |
| cpe:2.3:h:iptime:n2e:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:iptime:n2eplus_firmware:*:*:*:*:*:*:*:* | 9.90.8 (including) | 10.06.8 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://docs.google.com/spreadsheets/d/1kryOFltCmnPJvDTpIrudgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing
- https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md
- https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/assets/affected_products_cve_format.json
- https://iptime.com/iptime/?pageid=4&page_id=126&dfsid=3&dftid=583&uid=25203&mod=document



