9.8
CRITICAL CVSS 3.1
CVE-2025-55423
ipTIME Routers Command Injection Vulnerability
Description

A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.

INFO

Published Date :

Jan. 20, 2026, 6:16 p.m.

Last Modified :

Jan. 30, 2026, 8:07 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2025-55423 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Iptime n104s-r1_firmware
2 Iptime n104s-r1
3 Iptime n104v_firmware
4 Iptime n104v
5 Iptime n1e_firmware
6 Iptime n1e
7 Iptime n1plus_firmware
8 Iptime n1plus
9 Iptime n1plus-i_firmware
10 Iptime n1plus-i
11 Iptime n1v_firmware
12 Iptime n1v
13 Iptime n2e_firmware
14 Iptime n2e
15 Iptime n2eplus_firmware
16 Iptime n2eplus
17 Iptime n2plus_firmware
18 Iptime n2plus
19 Iptime n2plus-i_firmware
20 Iptime n2plus-i
21 Iptime n2v_firmware
22 Iptime n2v
23 Iptime n2vs_firmware
24 Iptime n2vs
25 Iptime n3_firmware
26 Iptime n3
27 Iptime n3-i_firmware
28 Iptime n3-i
29 Iptime n5_firmware
30 Iptime n5
31 Iptime n5-i_firmware
32 Iptime n5-i
33 Iptime n6_firmware
34 Iptime n6
35 Iptime n600_firmware
36 Iptime n600
37 Iptime n6004r_firmware
38 Iptime n6004r
39 Iptime n602e_firmware
40 Iptime n602e
41 Iptime n602eplus_firmware
42 Iptime n602eplus
43 Iptime n602se_firmware
44 Iptime n602se
45 Iptime n604_black_firmware
46 Iptime n604_black
47 Iptime n604a_firmware
48 Iptime n604a
49 Iptime n604e_firmware
50 Iptime n604e
51 Iptime n604eplus_firmware
52 Iptime n604eplus
53 Iptime n604plus_firmware
54 Iptime n604plus
55 Iptime n604plus-i_firmware
56 Iptime n604plus-i
57 Iptime n604r_firmware
58 Iptime n604r
59 Iptime n604rplus_firmware
60 Iptime n604rplus
61 Iptime n604rplus-i_firmware
62 Iptime n604rplus-i
63 Iptime n604s_firmware
64 Iptime n604s
65 Iptime n604se_firmware
66 Iptime n604se
67 Iptime n604t_firmware
68 Iptime n604t
69 Iptime n604tplus_firmware
70 Iptime n604tplus
71 Iptime n604v_firmware
72 Iptime n604v
73 Iptime n604vplus_firmware
74 Iptime n604vplus
75 Iptime n7004ns_firmware
76 Iptime n7004ns
77 Iptime n702bcm_firmware
78 Iptime n702bcm
79 Iptime n702e_firmware
80 Iptime n702e
81 Iptime ax11000_firmware
82 Iptime ax11000
83 Iptime ax2002mesh_firmware
84 Iptime ax2002mesh
85 Iptime ax2004_firmware
86 Iptime ax2004
87 Iptime ax2004bcm_firmware
88 Iptime ax2004bcm
89 Iptime ax2004m_firmware
90 Iptime ax2004m
91 Iptime ax3004bcm_firmware
92 Iptime ax3004bcm
93 Iptime ax3004itl_firmware
94 Iptime ax3004itl
95 Iptime ax8004bcm_firmware
96 Iptime ax8004bcm
97 Iptime ax8004m_firmware
98 Iptime ax8004m
99 Iptime ax8008m_firmware
100 Iptime ax8008m
101 Iptime a1_firmware
102 Iptime a1
103 Iptime a1004_firmware
104 Iptime a1004
105 Iptime a1004ns_firmware
106 Iptime a1004ns
107 Iptime a1004v_firmware
108 Iptime a1004v
109 Iptime a104_firmware
110 Iptime a104
111 Iptime a104ns_firmware
112 Iptime a104ns
113 Iptime a104r_firmware
114 Iptime a104r
115 Iptime a2003mu_firmware
116 Iptime a2003mu
117 Iptime a2003ns-mu_firmware
118 Iptime a2003ns-mu
119 Iptime a2004_firmware
120 Iptime a2004
121 Iptime a2004mu_firmware
122 Iptime a2004mu
123 Iptime a2004ns_firmware
124 Iptime a2004ns
125 Iptime a2004ns-mu_firmware
126 Iptime a2004ns-mu
127 Iptime a2004ns-r_firmware
128 Iptime a2004ns-r
129 Iptime a2004nsplus_firmware
130 Iptime a2004nsplus
131 Iptime a2004plus_firmware
132 Iptime a2004plus
133 Iptime a2004r_firmware
134 Iptime a2004r
135 Iptime a2004se_firmware
136 Iptime a2004se
137 Iptime a2008_firmware
138 Iptime a2008
139 Iptime a3_firmware
140 Iptime a3
141 Iptime a3002mesh_firmware
142 Iptime a3002mesh
143 Iptime a3003ns_firmware
144 Iptime a3003ns
145 Iptime a3004_firmware
146 Iptime a3004
147 Iptime a3004-dual_firmware
148 Iptime a3004-dual
149 Iptime a3004m_firmware
150 Iptime a3004m
151 Iptime a3004ns_firmware
152 Iptime a3004ns
153 Iptime a3004ns-bcm_firmware
154 Iptime a3004ns-bcm
155 Iptime a3004ns-dual_firmware
156 Iptime a3004ns-dual
157 Iptime a3004ns-m_firmware
158 Iptime a3004ns-m
159 Iptime a3004t_firmware
160 Iptime a3004t
161 Iptime a3004tw_firmware
162 Iptime a3004tw
163 Iptime a3008-mu_firmware
164 Iptime a3008-mu
165 Iptime a304_firmware
166 Iptime a304
167 Iptime a5004ns_firmware
168 Iptime a5004ns
169 Iptime a5004ns-m_firmware
170 Iptime a5004ns-m
171 Iptime a6004mx_firmware
172 Iptime a6004mx
173 Iptime a6004ns_firmware
174 Iptime a6004ns
175 Iptime a6004ns-m_firmware
176 Iptime a6004ns-m
177 Iptime a604_firmware
178 Iptime a604
179 Iptime a604-v3_firmware
180 Iptime a604-v3
181 Iptime a604-v5_firmware
182 Iptime a604-v5
183 Iptime a604g-mu_firmware
184 Iptime a604g-mu
185 Iptime a604g-skylife_firmware
186 Iptime a604g-skylife
187 Iptime a604m_firmware
188 Iptime a604m
189 Iptime a604mu_firmware
190 Iptime a604mu
191 Iptime a604r_firmware
192 Iptime a604r
193 Iptime a604se_firmware
194 Iptime a604se
195 Iptime a604v_firmware
196 Iptime a604v
197 Iptime a6ns-m_firmware
198 Iptime a6ns-m
199 Iptime a7004m_firmware
200 Iptime a7004m
201 Iptime a704ns-bcm_firmware
202 Iptime a704ns-bcm
203 Iptime a7ns_firmware
204 Iptime a7ns
205 Iptime a8004bcm_firmware
206 Iptime a8004bcm
207 Iptime a8004itl_firmware
208 Iptime a8004itl
209 Iptime a8004ns-m_firmware
210 Iptime a8004ns-m
211 Iptime a8004t_firmware
212 Iptime a8004t
213 Iptime a8004t-xr_firmware
214 Iptime a8004t-xr
215 Iptime a804ns-mu_firmware
216 Iptime a804ns-mu
217 Iptime a8ns-m_firmware
218 Iptime a8ns-m
219 Iptime a9004m_firmware
220 Iptime a9004m
221 Iptime a9004m-x2_firmware
222 Iptime a9004m-x2
223 Iptime ew302n_firmware
224 Iptime ew302n
225 Iptime n102e_firmware
226 Iptime n102e
227 Iptime n102eplus_firmware
228 Iptime n102eplus
229 Iptime n102i_firmware
230 Iptime n102i
231 Iptime n102iplus_firmware
232 Iptime n102iplus
233 Iptime n104_black_firmware
234 Iptime n104_black
235 Iptime n104e_firmware
236 Iptime n104e
237 Iptime n104eplus_firmware
238 Iptime n104eplus
239 Iptime n104k_firmware
240 Iptime n104k
241 Iptime n104plus_firmware
242 Iptime n104plus
243 Iptime n104plus-i_firmware
244 Iptime n104plus-i
245 Iptime n104q_firmware
246 Iptime n104q
247 Iptime n104q-i_firmware
248 Iptime n104q-i
249 Iptime n104r_firmware
250 Iptime n104r
251 Iptime n702eplus_firmware
252 Iptime n702eplus
253 Iptime n702r_firmware
254 Iptime n702r
255 Iptime n704-a3_firmware
256 Iptime n704-a3
257 Iptime n704bcm_firmware
258 Iptime n704bcm
259 Iptime n704e_firmware
260 Iptime n704e
261 Iptime n704eplus_firmware
262 Iptime n704eplus
263 Iptime n704ns_firmware
264 Iptime n704ns
265 Iptime n704qca_firmware
266 Iptime n704qca
267 Iptime n704v3_firmware
268 Iptime n704v3
269 Iptime n8004r_firmware
270 Iptime n8004r
271 Iptime n8004v_firmware
272 Iptime n8004v
273 Iptime n804_firmware
274 Iptime n804
275 Iptime n804a_firmware
276 Iptime n804a
277 Iptime n804a3_firmware
278 Iptime n804a3
279 Iptime n804r_firmware
280 Iptime n804r
281 Iptime n804t_firmware
282 Iptime n804t
283 Iptime n804t3_firmware
284 Iptime n804t3
285 Iptime n804v_firmware
286 Iptime n804v
287 Iptime n904_firmware
288 Iptime n904
289 Iptime n904ns_firmware
290 Iptime n904ns
291 Iptime n904plus_firmware
292 Iptime n904plus
293 Iptime n904v_firmware
294 Iptime n904v
295 Iptime smart_firmware
296 Iptime smart
297 Iptime q1_firmware
298 Iptime q1
299 Iptime q304_firmware
300 Iptime q304
301 Iptime q504_firmware
302 Iptime q504
303 Iptime q604_firmware
304 Iptime q604
305 Iptime t16000_firmware
306 Iptime t16000
307 Iptime t16000m_firmware
308 Iptime t16000m
309 Iptime t24000_firmware
310 Iptime t24000
311 Iptime t24000m_firmware
312 Iptime t24000m
313 Iptime t3004_firmware
314 Iptime t3004
315 Iptime t3008_firmware
316 Iptime t3008
317 Iptime t5004_firmware
318 Iptime t5004
319 Iptime t5008_firmware
320 Iptime t5008
321 Iptime v304_firmware
322 Iptime v304
323 Iptime v504_firmware
324 Iptime v504
325 Iptime v508_firmware
326 Iptime v508
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
Update router firmware to patch the OS command injection vulnerability.
  • Identify affected router models and firmware versions.
  • Download and install the latest firmware updates from the vendor.
  • Verify the installation of updated firmware.
  • Restart the router after firmware update.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2025-55423.

URL Resource
https://docs.google.com/spreadsheets/d/1kryOFltCmnPJvDTpIrudgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing Third Party Advisory
https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md Exploit Third Party Advisory
https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/assets/affected_products_cve_format.json Third Party Advisory
https://iptime.com/iptime/?pageid=4&page_id=126&dfsid=3&dftid=583&uid=25203&mod=document Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-55423 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-55423 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-55423 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-55423 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 30, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104s-r1_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n104s-r1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n1e_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n1e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n1plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n1plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n1plus-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n1plus-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n1v_firmware:*:*:*:*:*:*:*:* versions from (including) 11.01.2 up to (including) 12.07.6 OR cpe:2.3:h:iptime:n1v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2e_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n2e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n2eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n2plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2plus-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n2plus-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2v_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.2 up to (including) 12.16.8 OR cpe:2.3:h:iptime:n2v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n2vs_firmware:12.16.8:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:n2vs:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.93.2 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n3-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n3-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n5_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n5-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n5-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n6_firmware:*:*:*:*:*:*:*:* versions from (including) 9.96.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n6:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n600_firmware:*:*:*:*:*:*:*:* versions from (including) 10.00.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n6004r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n6004r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n602e_firmware:*:*:*:*:*:*:*:* versions from (including) 11.96.6 up to (including) 12.16.8 OR cpe:2.3:h:iptime:n602e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n602eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n602eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n602se_firmware:*:*:*:*:*:*:*:* versions from (including) 14.19.0 up to (including) 14.19.4 OR cpe:2.3:h:iptime:n602se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604_black_firmware:*:*:*:*:*:*:*:* versions from (including) 9.93.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n604_black:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604a_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604e_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:n604e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:n604eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n604plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604plus-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 12.14.6 OR cpe:2.3:h:iptime:n604plus-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604rplus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604rplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604rplus-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604rplus-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604s_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604s:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604se_firmware:*:*:*:*:*:*:*:* versions from (including) 14.18.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:n604se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604t_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.03.2 OR cpe:2.3:h:iptime:n604t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604tplus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.03.2 OR cpe:2.3:h:iptime:n604tplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n604vplus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n604vplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n7004ns_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:n7004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n702bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n702bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n702e_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.2 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n702e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax11000_firmware:*:*:*:*:*:*:*:* versions from (including) 14.16.6 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax11000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax2002mesh_firmware:*:*:*:*:*:*:*:* versions from (including) 14.16.6 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax2002mesh:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax2004_firmware:*:*:*:*:*:*:*:* versions from (including) 14.17.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax2004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax2004bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 12.04.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax2004bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax2004m_firmware:*:*:*:*:*:*:*:* versions from (including) 14.02.0 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax2004m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax3004bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 14.16.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax3004bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax3004itl_firmware:*:*:*:*:*:*:*:* versions from (including) 12.01.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax3004itl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax8004bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 11.97.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax8004bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax8004m_firmware:*:*:*:*:*:*:*:* versions from (including) 14.05.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax8004m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ax8008m_firmware:*:*:*:*:*:*:*:* versions from (including) 14.15.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:ax8008m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a1_firmware:*:*:*:*:*:*:*:* versions from (including) 9.96.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a1004_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a1004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a1004ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.96.0 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a1004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a1004v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a1004v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a104_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.03.8 OR cpe:2.3:h:iptime:a104:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a104ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.96.0 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a104ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a104r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 *cpe:2.3:o:iptime:a104r_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:a104r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2003mu_firmware:*:*:*:*:*:*:*:* versions from (including) 12.13.0 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a2003mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2003ns-mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.00.6 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a2003ns-mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a2004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.08.6 up to (including) 12.17.0 OR cpe:2.3:h:iptime:a2004mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a2004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004ns-mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.08.6 up to (including) 12.17.0 OR cpe:2.3:h:iptime:a2004ns-mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004ns-r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a2004ns-r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004nsplus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a2004nsplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a2004plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a2004r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2004se_firmware:*:*:*:*:*:*:*:* versions from (including) 14.16.6 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a2004se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a2008_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a2008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.97.2 up to (including) 10.07.2 OR cpe:2.3:h:iptime:a3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3002mesh_firmware:*:*:*:*:*:*:*:* versions from (including) 12.05.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3002mesh:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3003ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a3003ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.08.2 OR cpe:2.3:h:iptime:a3004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004-dual_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.4 up to (including) 10.07.2 OR cpe:2.3:h:iptime:a3004-dual:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004m_firmware:*:*:*:*:*:*:*:* versions from (including) 14.18.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3004m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.2 up to (including) 10.09.4 OR cpe:2.3:h:iptime:a3004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004ns-bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 9.95.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a3004ns-bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004ns-dual_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.4 up to (including) 12.09.4 OR cpe:2.3:h:iptime:a3004ns-dual:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.05.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3004ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004t_firmware:*:*:*:*:*:*:*:* versions from (including) 12.10.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3004t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3004tw_firmware:*:*:*:*:*:*:*:* versions from (including) 14.15.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3004tw:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a3008-mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.08.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a3008-mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a304_firmware:*:*:*:*:*:*:*:* versions from (including) 10.05.4 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a304:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a5004ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.2 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a5004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a5004ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.05.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a5004ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a6004mx_firmware:*:*:*:*:*:*:*:* versions from (including) 12.04.6 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a6004mx:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a6004ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.2 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a6004ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a6004ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.8 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a6004ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.06.6 OR cpe:2.3:h:iptime:a604:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604-v3_firmware:*:*:*:*:*:*:*:* versions from (including) 10.01.6 up to (including) 10.07.2 OR cpe:2.3:h:iptime:a604-v3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604-v5_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.2 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a604-v5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604g-mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.07.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a604g-mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604g-skylife_firmware:*:*:*:*:*:*:*:* versions from (including) 12.02.4 up to (including) 12.12.4 OR cpe:2.3:h:iptime:a604g-skylife:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.06.4 up to (including) 10.07.2 OR cpe:2.3:h:iptime:a604m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604mu_firmware:*:*:*:*:*:*:*:* versions from (including) 12.12.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a604mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604r_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.2 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a604r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604se_firmware:*:*:*:*:*:*:*:* versions from (including) 14.17.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a604se:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a604v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.07.4 OR cpe:2.3:h:iptime:a604v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a6ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.01.6 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a6ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a7004m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.06.8 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a7004m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a704ns-bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 9.95.8 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a704ns-bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a7ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.96.0 up to (including) 11.00.4 OR cpe:2.3:h:iptime:a7ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8004bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 11.99.1 up to (including) 12.16.2 OR cpe:2.3:h:iptime:a8004bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8004itl_firmware:*:*:*:*:*:*:*:* versions from (including) 11.00.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a8004itl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8004ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a8004ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8004t_firmware:*:*:*:*:*:*:*:* versions from (including) 10.06.8 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a8004t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8004t-xr_firmware:*:*:*:*:*:*:*:* versions from (including) 11.97.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a8004t-xr:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a804ns-mu_firmware:*:*:*:*:*:*:*:* versions from (including) 10.06.4 up to (including) 12.10.2 OR cpe:2.3:h:iptime:a804ns-mu:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a8ns-m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.03.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a8ns-m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a9004m_firmware:*:*:*:*:*:*:*:* versions from (including) 10.05.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a9004m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:a9004m-x2_firmware:*:*:*:*:*:*:*:* versions from (including) 11.98.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:a9004m-x2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:ew302n_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:ew302n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n102e_firmware:*:*:*:*:*:*:*:* versions from (including) 11.00.8 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n102e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n102eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n102eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n102i_firmware:*:*:*:*:*:*:*:* versions from (including) 11.01.2 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n102i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n102iplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n102iplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104_black_firmware:*:*:*:*:*:*:*:* versions from (including) 9.93.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104_black:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104e_firmware:*:*:*:*:*:*:*:* versions from (including) 10.09.4 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n104e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 12.15.2 OR cpe:2.3:h:iptime:n104eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104k_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104plus-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104plus-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104q_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104q:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104q-i_firmware:*:*:*:*:*:*:*:* versions from (including) 9.99.6 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104q-i:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n104r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n104r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n702eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.12.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n702eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n702r_firmware:*:*:*:*:*:*:*:* versions from (including) 10.05.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n702r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704-a3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.06.8 OR cpe:2.3:h:iptime:n704-a3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704bcm_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n704bcm:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704e_firmware:*:*:*:*:*:*:*:* versions from (including) 11.98.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n704e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704eplus_firmware:*:*:*:*:*:*:*:* versions from (including) 12.14.2 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n704eplus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.4 up to (including) 9.96.0 OR cpe:2.3:h:iptime:n704ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704qca_firmware:*:*:*:*:*:*:*:* versions from (including) 10.02.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n704qca:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n704v3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.10.2 OR cpe:2.3:h:iptime:n704v3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n8004r_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n8004r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n8004v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n8004v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804a_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804a3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804a3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804r_firmware:*:*:*:*:*:*:*:* versions from (including) 10.06.4 up to (including) 12.16.2 OR cpe:2.3:h:iptime:n804r:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804t_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804t3_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804t3:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n804v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 9.96.8 OR cpe:2.3:h:iptime:n804v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n904_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n904:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n904ns_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.4 up to (including) 9.96.0 OR cpe:2.3:h:iptime:n904ns:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n904plus_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n904plus:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:n904v_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 10.02.2 OR cpe:2.3:h:iptime:n904v:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:smart_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 9.94.2 OR cpe:2.3:h:iptime:smart:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:q1_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:q1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:q304_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:q304:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:q504_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:q504:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:q604_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:q604:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t16000_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 11.03.6 OR cpe:2.3:h:iptime:t16000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t16000m_firmware:*:*:*:*:*:*:*:* versions from (including) 12.07.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:t16000m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t24000_firmware:*:*:*:*:*:*:*:* versions from (including) 9.91.2 up to (including) 11.03.6 OR cpe:2.3:h:iptime:t24000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t24000m_firmware:*:*:*:*:*:*:*:* versions from (including) 12.07.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:t24000m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t3004_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.07.6 OR cpe:2.3:h:iptime:t3004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t3008_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.09.6 OR cpe:2.3:h:iptime:t3008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t5004_firmware:*:*:*:*:*:*:*:* versions from (including) 11.96.4 up to (including) 14.19.4 OR cpe:2.3:h:iptime:t5004:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:t5008_firmware:*:*:*:*:*:*:*:* versions from (including) 11.98.2 up to (including) 14.19.4 OR cpe:2.3:h:iptime:t5008:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:v304_firmware:9.91.2:*:*:*:*:*:*:* OR cpe:2.3:h:iptime:v304:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:v504_firmware:*:*:*:*:*:*:*:* versions from (including) 9.90.8 up to (including) 12.15.2 OR cpe:2.3:h:iptime:v504:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:iptime:v508_firmware:*:*:*:*:*:*:*:* versions from (including) 10.02.2 up to (including) 10.06.4 OR cpe:2.3:h:iptime:v508:-:*:*:*:*:*:*:*
    Added Reference Type MITRE: https://docs.google.com/spreadsheets/d/1kryOFltCmnPJvDTpIrudgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing Types: Third Party Advisory
    Added Reference Type MITRE: https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/assets/affected_products_cve_format.json Types: Third Party Advisory
    Added Reference Type MITRE: https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md Types: Exploit, Third Party Advisory
    Added Reference Type MITRE: https://iptime.com/iptime/?pageid=4&page_id=126&dfsid=3&dftid=583&uid=25203&mod=document Types: Vendor Advisory
  • CVE Modified by [email protected]

    Jan. 21, 2026

    Action Type Old Value New Value
    Changed Description ipTIME routers A2003NS-MU 10.00.6 to 12.16.2 , N600 10.00.8 to 12.16.2, A604-V3 10.01.6 to 10.07.2, A6ns-M 10.01.6 to 14.19.4 , V508 10.02.2 to 10.06.4, N704QCA 10.02.4 to 12.16.2, A8ns-M 10.03.2 to 14.19.4, A304 10.05.4 to 10.07.4, A3004NS-M,A5004NS-M,A9004M 10.05.4 to 14.19.4, N702R 10.05.8 to 10.06.8, A604M 10.06.4 to 10.07.2, A804NS-MU 10.06.4 to 12.10.2, N804R 10.06.4 to 12.16.2, A7004M,A8004T 10.06.8 to 14.19.4, A604G-MU 10.07.4 to 12.16.2, A3008-MU 10.08.4 to 14.19.4, A2004MU and A2004NS-MU 10.08.6 to 12.17.0, A604-V5,A604R, N702E 10.09.2 to 12.16.2, N2V 10.09.2 to 12.16.8, N604E 10.09.2 to 14.19.4, N104E 10.09.4 to 12.15.2, A8004ITL 11.00.4 to 14.19.4, N102E 11.00.8 to 12.15.2, N1V 11.01.2 to 12.07.6, N102i 11.01.2 to 12.15.2, T5004 11.96.4 to 14.19.4, N602E 11.96.6 to 12.16.8, AX8004BCM and A8004T-XR 11.97.2 to 14.19.4, A9004M-X2, T5008 11.98.2 to 14.19.4, N704E 11.98.4 to 12.16.2, A8004BCM 11.99.1 to 12.16.2, AX3004ITL 12.01.2 to 14.19.4 and A604G-skylife 12.02.4 to 12.12 were discovered to contain an OS command injection vulnerability via the function upnp_relay(). A command injection vulnerability exists in the upnp_relay() function in multiple ipTIME router models because the controlURL value used to pass port-forwarding information to an upper router is passed to system() without proper validation or sanitization, allowing OS command injection.
    Added Reference https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/assets/affected_products_cve_format.json
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Jan. 21, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-94
  • New CVE Received by [email protected]

    Jan. 20, 2026

    Action Type Old Value New Value
    Added Description ipTIME routers A2003NS-MU 10.00.6 to 12.16.2 , N600 10.00.8 to 12.16.2, A604-V3 10.01.6 to 10.07.2, A6ns-M 10.01.6 to 14.19.4 , V508 10.02.2 to 10.06.4, N704QCA 10.02.4 to 12.16.2, A8ns-M 10.03.2 to 14.19.4, A304 10.05.4 to 10.07.4, A3004NS-M,A5004NS-M,A9004M 10.05.4 to 14.19.4, N702R 10.05.8 to 10.06.8, A604M 10.06.4 to 10.07.2, A804NS-MU 10.06.4 to 12.10.2, N804R 10.06.4 to 12.16.2, A7004M,A8004T 10.06.8 to 14.19.4, A604G-MU 10.07.4 to 12.16.2, A3008-MU 10.08.4 to 14.19.4, A2004MU and A2004NS-MU 10.08.6 to 12.17.0, A604-V5,A604R, N702E 10.09.2 to 12.16.2, N2V 10.09.2 to 12.16.8, N604E 10.09.2 to 14.19.4, N104E 10.09.4 to 12.15.2, A8004ITL 11.00.4 to 14.19.4, N102E 11.00.8 to 12.15.2, N1V 11.01.2 to 12.07.6, N102i 11.01.2 to 12.15.2, T5004 11.96.4 to 14.19.4, N602E 11.96.6 to 12.16.8, AX8004BCM and A8004T-XR 11.97.2 to 14.19.4, A9004M-X2, T5008 11.98.2 to 14.19.4, N704E 11.98.4 to 12.16.2, A8004BCM 11.99.1 to 12.16.2, AX3004ITL 12.01.2 to 14.19.4 and A604G-skylife 12.02.4 to 12.12 were discovered to contain an OS command injection vulnerability via the function upnp_relay().
    Added Reference https://docs.google.com/spreadsheets/d/1kryOFltCmnPJvDTpIrudgryt79uI4PWchuQ8-Gak24c/edit?usp=sharing
    Added Reference https://github.com/0x0xxxx/CVE/blob/main/CVE-2025-55423/README.md
    Added Reference https://iptime.com/iptime/?pageid=4&page_id=126&dfsid=3&dftid=583&uid=25203&mod=document
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 9.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact