CVE-2025-11779: CWE-121: Stack-based Buffer Overflow in SGE-PLC1000 SGE-PLC50 Circutor
Stack-based buffer overflow vulnerability in CircutorSGE-PLC1000/SGE-PLC50 v9.0.2. The 'SetLan' function is invoked when a new configuration is applied. This new configuration function is activated by a management web request, which can be invoked by a user when making changes to the 'index.cgi' web application. The parameters are not being sanitised, which could lead to command injection.
AI Analysis
Technical Summary
CVE-2025-11779 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting Circutor's SGE-PLC1000 and SGE-PLC50 devices running firmware version 9.0.2. The vulnerability arises in the 'SetLan' function, which is invoked when new configurations are applied via the device's management web interface, specifically through the 'index.cgi' application. The root cause is the lack of input sanitization on parameters passed during configuration changes, enabling an attacker to perform command injection. This flaw allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to execute arbitrary code remotely over an adjacent network (AV:A). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), indicating potential full system compromise, data leakage, or denial of service. The CVSS 4.0 score of 9.4 underscores the criticality of this issue. Although no public exploits have been reported yet, the vulnerability's characteristics make exploitation feasible, especially in environments where management interfaces are exposed or insufficiently protected. The affected devices are commonly used in industrial and energy management contexts, where reliability and security are paramount. The vulnerability was reserved on 2025-10-15 and published on 2025-12-02 by INCIBE, highlighting its recent discovery and the need for immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant threat, particularly to those operating critical infrastructure such as energy distribution, industrial automation, and building management systems where Circutor devices are deployed. Exploitation could lead to unauthorized command execution, allowing attackers to disrupt operations, manipulate device configurations, or cause denial of service. This can result in operational downtime, safety hazards, financial losses, and potential regulatory penalties under frameworks like NIS2 and GDPR if sensitive data or critical services are impacted. The vulnerability's ability to be exploited remotely with low privileges and no user interaction increases the attack surface, especially if management interfaces are accessible from internal or external networks. Given the strategic importance of energy and industrial sectors in Europe, successful exploitation could have cascading effects on supply chains and public services.
Mitigation Recommendations
1. Immediately restrict network access to the management web interface of affected Circutor devices, ideally isolating them on dedicated management VLANs or networks with strict firewall rules. 2. Implement strong authentication and access control measures to limit who can apply configuration changes. 3. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block malicious payloads targeting the 'index.cgi' endpoint. 4. Monitor device logs and network traffic for unusual configuration changes or command execution attempts. 5. Coordinate with Circutor for firmware updates or patches addressing CVE-2025-11779 and apply them promptly once available. 6. If patches are not yet available, consider temporary mitigations such as disabling remote configuration capabilities or limiting configuration changes to trusted administrators via secure channels. 7. Conduct regular security assessments and penetration tests on industrial control systems to identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, Spain, Italy, United Kingdom, Netherlands, Belgium
CVE-2025-11779: CWE-121: Stack-based Buffer Overflow in SGE-PLC1000 SGE-PLC50 Circutor
Description
Stack-based buffer overflow vulnerability in CircutorSGE-PLC1000/SGE-PLC50 v9.0.2. The 'SetLan' function is invoked when a new configuration is applied. This new configuration function is activated by a management web request, which can be invoked by a user when making changes to the 'index.cgi' web application. The parameters are not being sanitised, which could lead to command injection.
AI-Powered Analysis
Technical Analysis
CVE-2025-11779 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting Circutor's SGE-PLC1000 and SGE-PLC50 devices running firmware version 9.0.2. The vulnerability arises in the 'SetLan' function, which is invoked when new configurations are applied via the device's management web interface, specifically through the 'index.cgi' application. The root cause is the lack of input sanitization on parameters passed during configuration changes, enabling an attacker to perform command injection. This flaw allows an attacker with low privileges (PR:L) and no user interaction (UI:N) to execute arbitrary code remotely over an adjacent network (AV:A). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), indicating potential full system compromise, data leakage, or denial of service. The CVSS 4.0 score of 9.4 underscores the criticality of this issue. Although no public exploits have been reported yet, the vulnerability's characteristics make exploitation feasible, especially in environments where management interfaces are exposed or insufficiently protected. The affected devices are commonly used in industrial and energy management contexts, where reliability and security are paramount. The vulnerability was reserved on 2025-10-15 and published on 2025-12-02 by INCIBE, highlighting its recent discovery and the need for immediate attention.
Potential Impact
For European organizations, this vulnerability poses a significant threat, particularly to those operating critical infrastructure such as energy distribution, industrial automation, and building management systems where Circutor devices are deployed. Exploitation could lead to unauthorized command execution, allowing attackers to disrupt operations, manipulate device configurations, or cause denial of service. This can result in operational downtime, safety hazards, financial losses, and potential regulatory penalties under frameworks like NIS2 and GDPR if sensitive data or critical services are impacted. The vulnerability's ability to be exploited remotely with low privileges and no user interaction increases the attack surface, especially if management interfaces are accessible from internal or external networks. Given the strategic importance of energy and industrial sectors in Europe, successful exploitation could have cascading effects on supply chains and public services.
Mitigation Recommendations
1. Immediately restrict network access to the management web interface of affected Circutor devices, ideally isolating them on dedicated management VLANs or networks with strict firewall rules. 2. Implement strong authentication and access control measures to limit who can apply configuration changes. 3. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block malicious payloads targeting the 'index.cgi' endpoint. 4. Monitor device logs and network traffic for unusual configuration changes or command execution attempts. 5. Coordinate with Circutor for firmware updates or patches addressing CVE-2025-11779 and apply them promptly once available. 6. If patches are not yet available, consider temporary mitigations such as disabling remote configuration capabilities or limiting configuration changes to trusted administrators via secure channels. 7. Conduct regular security assessments and penetration tests on industrial control systems to identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-10-15T12:06:08.399Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692ee9705ae7112264cd3976
Added to database: 12/2/2025, 1:28:16 PM
Last enriched: 12/2/2025, 1:46:27 PM
Last updated: 12/4/2025, 3:47:44 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-57213: n/a
HighCVE-2025-57212: n/a
HighCVE-2025-57210: n/a
HighCVE-2025-14024
LowCVE-2025-8074: Origin Validation Error in Synology BeeDrive for desktop
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.