U-SPEED AC1200 Gigabit Wi-Fi Router (Model: T18-21K) V1.0 is vulnerable to Command Injection. The Network Time Protocol (NTP) configuration interface does not properly sanitize user-supplied input. An authenticated user with permission to configure NTP settings can inject arbitrary system commands through crafted input fields. These commands are executed with elevated privileges, leading to potential full system compromise.
History

Sun, 17 May 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared U-speed
U-speed ac1200 Gigabit Wifi Router
Vendors & Products U-speed
U-speed ac1200 Gigabit Wifi Router

Thu, 14 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Command Injection in NTP Configuration of U‑SPEED AC1200 Gigabit Wi‑Fi Router

Thu, 14 May 2026 13:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description U-SPEED AC1200 Gigabit Wi-Fi Router (Model: T18-21K) V1.0 is vulnerable to Command Injection. The Network Time Protocol (NTP) configuration interface does not properly sanitize user-supplied input. An authenticated user with permission to configure NTP settings can inject arbitrary system commands through crafted input fields. These commands are executed with elevated privileges, leading to potential full system compromise.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-13T00:00:00.000Z

Updated: 2026-05-14T12:38:32.916Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-36741

cve-icon Vulnrichment

Updated: 2026-05-14T12:36:46.997Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T16:16:40.840

Modified: 2026-05-14T13:16:17.373

Link: CVE-2026-36741

cve-icon Redhat

No data.