Cyber Posture

CVE-2026-5573

HighPublic PoC

Published: 05 April 2026

Published
05 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 4.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-5573 is a high-severity Improper Access Control (CWE-284) vulnerability in Technostrobe Hi-Led-Wr120-G2 Firmware. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on the /fs function to prevent unauthorized cwd argument manipulation enabling unrestricted file uploads.

prevent

Validates inputs such as the cwd argument to block manipulation that leads to unrestricted file uploads in the vulnerable firmware.

prevent

Restricts classes of files and upload locations to mitigate unrestricted upload of dangerous files via the /fs endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Unauthenticated remote unrestricted file upload in public-facing firmware directly enables T1190 exploitation and facilitates T1105 arbitrary file/tool ingress.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A weakness has been identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. This impacts an unknown function of the file /fs. Executing a manipulation of the argument cwd can lead to unrestricted upload. The attack can be launched remotely. The exploit has been…

more

made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-5573 is an unrestricted file upload vulnerability in the Technostrobe HI-LED-WR120-G2 firmware version 5.5.0.1R6.03.30. The issue affects an unknown function within the /fs file, where manipulation of the cwd argument enables attackers to upload files without restrictions. It is associated with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type), carrying a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, primarily through arbitrary file uploads that could facilitate further compromise depending on the uploaded content.

Advisories from VulDB and a GitHub vulnerability research repository detail the issue, noting that a public exploit is available and could be used in attacks. The vendor was contacted early for disclosure but provided no response, and no patches or specific mitigations are referenced.

Details

CWE(s)

Affected Products

technostrobe
hi-led-wr120-g2 firmware
5.5.0.1r6.03.30

CVEs Like This One

CVE-2026-5569Same product: Technostrobe Hi-Led-Wr120-G2
CVE-2026-5571Same product: Technostrobe Hi-Led-Wr120-G2
CVE-2026-5570Same product: Technostrobe Hi-Led-Wr120-G2
CVE-2026-5574Same product: Technostrobe Hi-Led-Wr120-G2
CVE-2025-7880Shared CWE-284, CWE-434
CVE-2025-1834Shared CWE-284, CWE-434
CVE-2025-1166Shared CWE-284, CWE-434
CVE-2026-4221Shared CWE-284, CWE-434
CVE-2025-1555Shared CWE-284, CWE-434
CVE-2025-1818Shared CWE-284, CWE-434

References