CVE-2025-11243: CWE-770 Allocation of Resources Without Limits or Throttling in Shelly Pro 4PM
Allocation of Resources Without Limits or Throttling vulnerability in Shelly Pro 4PM (before v1.6) allows Excessive Allocation via network.
AI Analysis
Technical Summary
CVE-2025-11243 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This issue exists in the Shelly Pro 4PM smart device firmware versions before 1.6. The vulnerability allows an unauthenticated attacker to send network requests that cause the device to allocate excessive resources, such as memory or processing capacity, without any mechanism to limit or throttle these allocations. This can lead to resource exhaustion, resulting in denial of service (DoS) conditions where the device becomes unresponsive or crashes. The CVSS 4.0 vector indicates that the attack can be performed remotely (Attack Vector: Adjacent Network), requires low attack complexity, no privileges, no user interaction, and has a high impact on availability. The vulnerability does not affect confidentiality or integrity directly but severely impacts availability, which is critical for devices often used in smart home or industrial automation scenarios. No public exploits have been reported yet, but the high severity score suggests that exploitation could disrupt operations significantly. The lack of patch links indicates that a fix might be pending or not yet publicly released, emphasizing the need for proactive mitigation. Given the device’s role in power management and automation, such disruptions could cascade into broader operational issues.
Potential Impact
For European organizations, especially those relying on Shelly Pro 4PM devices for smart building management, industrial automation, or energy monitoring, this vulnerability poses a significant risk of service disruption. A successful exploitation could lead to denial of service, causing devices to become unresponsive and potentially interrupting critical infrastructure operations. This could affect manufacturing plants, data centers, and smart grid components, leading to operational downtime and financial losses. Additionally, the inability to control or throttle resource allocation could be exploited in coordinated attacks to amplify impact across multiple devices. The disruption of power management or automation systems could also have safety implications in industrial environments. Given the increasing adoption of IoT devices in Europe, the vulnerability could undermine trust in smart device deployments and necessitate costly incident response and recovery efforts.
Mitigation Recommendations
1. Update the Shelly Pro 4PM devices to firmware version 1.6 or later as soon as the patch becomes available from the vendor. 2. Until patches are applied, implement network-level rate limiting and traffic shaping to restrict the volume of requests directed at Shelly devices, especially from untrusted networks. 3. Segment IoT devices on separate VLANs or network zones with strict access controls to limit exposure to potential attackers. 4. Monitor network traffic for unusual spikes or patterns indicative of resource exhaustion attempts targeting Shelly devices. 5. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior related to resource allocation abuse. 6. Conduct regular audits of IoT device firmware versions and configurations to ensure timely patching and compliance. 7. Engage with the vendor for timely updates and advisories regarding this vulnerability and any related security improvements.
Affected Countries
Germany, France, Netherlands, Italy, United Kingdom
CVE-2025-11243: CWE-770 Allocation of Resources Without Limits or Throttling in Shelly Pro 4PM
Description
Allocation of Resources Without Limits or Throttling vulnerability in Shelly Pro 4PM (before v1.6) allows Excessive Allocation via network.
AI-Powered Analysis
Technical Analysis
CVE-2025-11243 is a vulnerability classified under CWE-770, which pertains to the allocation of resources without proper limits or throttling. This issue exists in the Shelly Pro 4PM smart device firmware versions before 1.6. The vulnerability allows an unauthenticated attacker to send network requests that cause the device to allocate excessive resources, such as memory or processing capacity, without any mechanism to limit or throttle these allocations. This can lead to resource exhaustion, resulting in denial of service (DoS) conditions where the device becomes unresponsive or crashes. The CVSS 4.0 vector indicates that the attack can be performed remotely (Attack Vector: Adjacent Network), requires low attack complexity, no privileges, no user interaction, and has a high impact on availability. The vulnerability does not affect confidentiality or integrity directly but severely impacts availability, which is critical for devices often used in smart home or industrial automation scenarios. No public exploits have been reported yet, but the high severity score suggests that exploitation could disrupt operations significantly. The lack of patch links indicates that a fix might be pending or not yet publicly released, emphasizing the need for proactive mitigation. Given the device’s role in power management and automation, such disruptions could cascade into broader operational issues.
Potential Impact
For European organizations, especially those relying on Shelly Pro 4PM devices for smart building management, industrial automation, or energy monitoring, this vulnerability poses a significant risk of service disruption. A successful exploitation could lead to denial of service, causing devices to become unresponsive and potentially interrupting critical infrastructure operations. This could affect manufacturing plants, data centers, and smart grid components, leading to operational downtime and financial losses. Additionally, the inability to control or throttle resource allocation could be exploited in coordinated attacks to amplify impact across multiple devices. The disruption of power management or automation systems could also have safety implications in industrial environments. Given the increasing adoption of IoT devices in Europe, the vulnerability could undermine trust in smart device deployments and necessitate costly incident response and recovery efforts.
Mitigation Recommendations
1. Update the Shelly Pro 4PM devices to firmware version 1.6 or later as soon as the patch becomes available from the vendor. 2. Until patches are applied, implement network-level rate limiting and traffic shaping to restrict the volume of requests directed at Shelly devices, especially from untrusted networks. 3. Segment IoT devices on separate VLANs or network zones with strict access controls to limit exposure to potential attackers. 4. Monitor network traffic for unusual spikes or patterns indicative of resource exhaustion attempts targeting Shelly devices. 5. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous behavior related to resource allocation abuse. 6. Conduct regular audits of IoT device firmware versions and configurations to ensure timely patching and compliance. 7. Engage with the vendor for timely updates and advisories regarding this vulnerability and any related security improvements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Nozomi
- Date Reserved
- 2025-10-02T14:06:12.008Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691d6a73a27e6d5e91bd838d
Added to database: 11/19/2025, 6:57:55 AM
Last enriched: 11/26/2025, 7:13:42 AM
Last updated: 1/7/2026, 8:56:02 AM
Views: 159
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.