CVE-2026-5573
Published: 05 April 2026
Summary
CVE-2026-5573 is a high-severity Improper Access Control (CWE-284) vulnerability in Technostrobe Hi-Led-Wr120-G2 Firmware. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations on the /fs function to prevent unauthorized cwd argument manipulation enabling unrestricted file uploads.
Validates inputs such as the cwd argument to block manipulation that leads to unrestricted file uploads in the vulnerable firmware.
Restricts classes of files and upload locations to mitigate unrestricted upload of dangerous files via the /fs endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote unrestricted file upload in public-facing firmware directly enables T1190 exploitation and facilitates T1105 arbitrary file/tool ingress.
NVD Description
A weakness has been identified in Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30. This impacts an unknown function of the file /fs. Executing a manipulation of the argument cwd can lead to unrestricted upload. The attack can be launched remotely. The exploit has been…
more
made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-5573 is an unrestricted file upload vulnerability in the Technostrobe HI-LED-WR120-G2 firmware version 5.5.0.1R6.03.30. The issue affects an unknown function within the /fs file, where manipulation of the cwd argument enables attackers to upload files without restrictions. It is associated with CWE-284 (Improper Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type), carrying a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, primarily through arbitrary file uploads that could facilitate further compromise depending on the uploaded content.
Advisories from VulDB and a GitHub vulnerability research repository detail the issue, noting that a public exploit is available and could be used in attacks. The vendor was contacted early for disclosure but provided no response, and no patches or specific mitigations are referenced.
Details
- CWE(s)