Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11784: CWE-121: Stack-based Buffer Overflow in SGE-PLC1000 SGE-PLC50 Circutor

0
High
VulnerabilityCVE-2025-11784cvecve-2025-11784cwe-121
Published: Tue Dec 02 2025 (12/02/2025, 13:01:15 UTC)
Source: CVE Database V5
Vendor/Project: SGE-PLC1000 SGE-PLC50
Product: Circutor

Description

Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'ShowMeterDatabase()' function, there is an unlimited user input that is copied to a fixed-size buffer via 'sprintf()'. The 'GetParameter(meter)' function retrieves the user input, which is directly incorporated into a buffer without size validation. An attacker can provide an excessively large input for the 'meter' parameter.

AI-Powered Analysis

AILast updated: 12/02/2025, 13:44:57 UTC

Technical Analysis

CVE-2025-11784 is a stack-based buffer overflow vulnerability identified in Circutor's SGE-PLC1000 and SGE-PLC50 devices, specifically in version 9.0.2 of their firmware/software. The vulnerability arises from improper handling of user input in the ShowMeterDatabase() function. The function uses sprintf() to copy data retrieved by GetParameter(meter) into a fixed-size buffer without validating the length of the input. Since sprintf() does not perform bounds checking, an attacker can supply an excessively large 'meter' parameter value, causing a buffer overflow on the stack. This memory corruption can lead to overwriting return addresses or other control data, potentially allowing an attacker to execute arbitrary code or cause a denial of service. The vulnerability requires low privileges (PR:L), no user interaction (UI:N), and has a network attack vector with adjacent network access (AV:A), indicating that the attacker must be on the same or a connected network segment. The impact on confidentiality is high, as attackers may gain unauthorized access to sensitive data or control functions. Integrity and availability impacts are also high due to possible system crashes or manipulation. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow). Although no public exploits are known yet, the severity and ease of exploitation make it a critical concern for affected users. The lack of an official patch at the time of publication necessitates immediate mitigation efforts.

Potential Impact

For European organizations, especially those in industrial automation, energy management, and critical infrastructure sectors, this vulnerability poses a significant risk. Circutor's SGE-PLC1000 and SGE-PLC50 devices are commonly used in power monitoring and control systems, which are integral to operational continuity and safety. Exploitation could lead to unauthorized control over power management devices, data leakage, or disruption of services, potentially causing operational downtime or safety hazards. Given the high confidentiality and availability impact, attackers could manipulate energy consumption data or disrupt power distribution, affecting industrial processes and utilities. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, as internal threat actors or lateral movement by external attackers could leverage this flaw. The absence of known exploits currently provides a window for proactive defense, but organizations must act swiftly to prevent future attacks. Failure to address this vulnerability could result in regulatory non-compliance, reputational damage, and financial losses.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Circutor SGE-PLC devices on dedicated network segments with strict access controls to limit exposure to adjacent network attackers. 2. Input validation: Implement additional filtering or validation proxies that sanitize or restrict the size of inputs sent to the 'meter' parameter before reaching the vulnerable function. 3. Access control tightening: Restrict user privileges to the minimum necessary, as the vulnerability requires low privileges but limiting access reduces attack surface. 4. Monitor network traffic and device logs for anomalous or oversized inputs targeting the meter parameter to detect potential exploitation attempts. 5. Engage with Circutor for timely firmware updates or patches; apply them as soon as they become available. 6. Conduct internal penetration testing and vulnerability assessments focusing on these devices to identify exposure and validate mitigations. 7. Develop incident response plans specific to industrial control system compromises involving these devices. 8. Educate operational technology (OT) and security teams about this vulnerability and the importance of layered defenses in industrial environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-10-15T12:06:14.111Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ee9705ae7112264cd3985

Added to database: 12/2/2025, 1:28:16 PM

Last enriched: 12/2/2025, 1:44:57 PM

Last updated: 12/5/2025, 5:48:06 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats