Skip to main content

CVE-2025-11045: Command Injection in WAYOS LQ_04

Medium
VulnerabilityCVE-2025-11045cvecve-2025-11045
Published: Fri Sep 26 2025 (09/26/2025, 20:32:07 UTC)
Source: CVE Database V5
Vendor/Project: WAYOS
Product: LQ_04

Description

A vulnerability was identified in WAYOS LQ_04, LQ_05, LQ_06, LQ_07 and LQ_09 22.03.17. This affects an unknown function of the file /usb_paswd.asp. The manipulation of the argument Name leads to command injection. The attack can be initiated remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/26/2025, 20:41:06 UTC

Technical Analysis

CVE-2025-11045 is a command injection vulnerability affecting multiple versions of WAYOS products, specifically LQ_04, LQ_05, LQ_06, LQ_07, and LQ_09 running version 22.03.17. The vulnerability resides in an unspecified function within the /usb_paswd.asp file, where manipulation of the 'Name' argument allows an attacker to inject arbitrary commands. This vulnerability can be exploited remotely without requiring authentication or user interaction, making it particularly dangerous. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). The vulnerability has a CVSS 4.0 base score of 6.9, categorized as medium severity. Although no known exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability's presence in multiple WAYOS LQ series devices suggests a systemic issue in the handling of input parameters in the affected firmware version. Given the nature of command injection, successful exploitation could allow attackers to execute arbitrary commands on the device, potentially leading to device takeover, data leakage, or disruption of network services.

Potential Impact

For European organizations, the impact of CVE-2025-11045 could be significant, especially for those relying on WAYOS LQ series devices in their network infrastructure. These devices are often used in networking environments such as ISPs, enterprise edge routers, or specialized network appliances. Exploitation could lead to unauthorized control over network devices, enabling attackers to intercept or manipulate network traffic, disrupt communications, or pivot to other internal systems. This could compromise sensitive data confidentiality and integrity and degrade availability of critical network services. The remote, unauthenticated nature of the vulnerability increases the risk of widespread exploitation, particularly in environments with exposed management interfaces. Given the public availability of exploits, attackers could automate attacks targeting vulnerable devices, increasing the likelihood of successful breaches. The medium severity rating indicates a moderate but non-trivial risk, necessitating prompt attention to prevent escalation or lateral movement within networks.

Mitigation Recommendations

To mitigate CVE-2025-11045, organizations should prioritize the following actions: 1) Immediately identify and inventory all WAYOS LQ series devices running version 22.03.17 or earlier. 2) Apply vendor-provided patches or firmware updates as soon as they become available; if no patches are currently released, engage with WAYOS support for guidance or workarounds. 3) Restrict remote access to management interfaces of affected devices using network segmentation, VPNs, or firewall rules to limit exposure to untrusted networks. 4) Implement strict input validation and filtering on affected parameters if custom configurations or scripts are used. 5) Monitor network traffic and device logs for unusual command execution patterns or unauthorized access attempts. 6) Consider temporary disabling or isolating vulnerable devices until remediation is complete. 7) Employ intrusion detection/prevention systems (IDS/IPS) with signatures targeting known exploit patterns for this vulnerability. These steps go beyond generic advice by focusing on immediate containment, access control, and proactive monitoring tailored to the specific vulnerability and affected products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-26T09:28:45.441Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d6fa2b4787b50b9b4329bf

Added to database: 9/26/2025, 8:40:11 PM

Last enriched: 9/26/2025, 8:41:06 PM

Last updated: 9/29/2025, 12:09:23 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats