Cyber Posture

CVE-2026-1740

High

Published: 02 February 2026

Published
02 February 2026
Modified
10 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0010 26.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1740 is a high-severity Improper Authentication (CWE-287) vulnerability in Iptime A8004T Firmware. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and remediation of the improper authentication flaw in the httpcon_check_session_url function of the router firmware.

prevent

Enforces approved authorizations for access to system resources, directly addressing the authentication bypass in the hidden loginsetup interface CGI script.

prevent

Mandates identification and authentication for organizational users, preventing remote unauthenticated exploitation of the vulnerable session check mechanism.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an improper authentication flaw in a public-facing router web interface (/cgi/timepro.cgi), enabling unauthenticated remote exploitation (AV:N/AC:L/PR:N/UI:N), directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_session_url of the file /cgi/timepro.cgi of the component Hidden Hiddenloginsetup Interface. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has…

more

been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-1740 is an improper authentication vulnerability (CWE-287) in the EFM ipTIME A8004T router firmware version 14.18.2. It affects the httpcon_check_session_url function in the /cgi/timepro.cgi file of the Hidden Hiddenloginsetup Interface component.

The vulnerability enables remote exploitation by unauthenticated attackers (AV:N/AC:L/PR:N/UI:N) with low complexity and no user interaction required. Successful attacks result in limited impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), earning a CVSS v3.1 base score of 7.3. A public exploit is available and could be used.

Advisories referenced on VulDB (ctiid.343639, id.343639, submit.741422) and a GitHub issue detail the issue, noting that the vendor was contacted early for disclosure but provided no response. No patches or official mitigations are mentioned.

Details

CWE(s)

Affected Products

iptime
a8004t firmware
14.18.2

CVEs Like This One

CVE-2026-1742Same product: Iptime A8004T
CVE-2026-24498Same vendor: Iptime
CVE-2025-55423Same product: Iptime A8004T
CVE-2026-5570Shared CWE-287
CVE-2025-52395Shared CWE-287
CVE-2025-15484Shared CWE-287
CVE-2026-41571Shared CWE-287
CVE-2026-2174Shared CWE-287
CVE-2025-71279Shared CWE-287
CVE-2024-13804Shared CWE-287

References