Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11788: CWE-122 Heap-based Buffer Overflow in SGE-PLC1000 SGE-PLC50 Circutor

0
High
VulnerabilityCVE-2025-11788cvecve-2025-11788cwe-122
Published: Tue Dec 02 2025 (12/02/2025, 13:03:32 UTC)
Source: CVE Database V5
Vendor/Project: SGE-PLC1000 SGE-PLC50
Product: Circutor

Description

Heap-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'ShowSupervisorParameters()' function, there is an unlimited user input that is copied to a fixed-size buffer via 'sprintf()'. The 'GetParameter(meter)' function retrieves the user input, which is directly incorporated into a buffer without size validation. An attacker can provide an excessively large input for the 'meter' parameter.

AI-Powered Analysis

AILast updated: 12/02/2025, 13:43:51 UTC

Technical Analysis

CVE-2025-11788 is a heap-based buffer overflow vulnerability identified in Circutor's SGE-PLC1000 and SGE-PLC50 devices, specifically in version 9.0.2 of their firmware/software. The vulnerability arises from the ShowSupervisorParameters() function, which calls GetParameter(meter) to retrieve user-supplied input. This input is then copied into a fixed-size buffer using the unsafe sprintf() function without any bounds checking or size validation. Because sprintf() does not limit the amount of data copied, an attacker can supply an excessively large 'meter' parameter value, causing a heap buffer overflow. This memory corruption can lead to arbitrary code execution, denial of service, or information disclosure. The CVSS 4.0 base score is 8.5 (high severity), reflecting network attack vector, low attack complexity, no privileges required beyond limited user privileges, no user interaction, and high impact on confidentiality and availability. The vulnerability is particularly dangerous because it can be triggered remotely over the network without user interaction, and the scope of impact includes critical industrial control devices used for energy monitoring and management. No patches are currently available, and no exploits have been reported in the wild. The vulnerability is assigned CWE-122, indicating a classic heap-based buffer overflow issue. The flaw's presence in critical infrastructure devices makes it a significant risk for operational disruption and potential compromise of industrial control systems.

Potential Impact

For European organizations, especially those in the energy, utilities, and industrial sectors, this vulnerability poses a significant risk. Circutor's SGE-PLC1000 and SGE-PLC50 devices are used for power monitoring and control, often integrated into critical infrastructure. Exploitation could lead to unauthorized control or disruption of energy management systems, causing outages or damage to physical equipment. Confidentiality breaches could expose sensitive operational data, while availability impacts could disrupt energy distribution or industrial processes. Given the network-exploitable nature and lack of required user interaction, attackers could remotely compromise devices, potentially leading to widespread operational disruptions. This risk is heightened in sectors where uptime and data integrity are paramount, such as power grids and manufacturing plants. The absence of patches increases the urgency for interim mitigations. Additionally, the vulnerability could be leveraged as a foothold for further attacks within industrial networks, amplifying the overall threat to European critical infrastructure.

Mitigation Recommendations

1. Immediate network segmentation: Isolate Circutor SGE-PLC1000 and SGE-PLC50 devices from general IT networks and restrict access to trusted management stations only. 2. Implement strict firewall rules to limit incoming traffic to the devices, allowing only necessary protocols and IP addresses. 3. Monitor network traffic for anomalous or oversized packets targeting the 'meter' parameter or related management interfaces. 4. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit buffer overflow patterns. 5. Coordinate with Circutor to obtain and apply official patches or firmware updates as soon as they become available. 6. Conduct thorough input validation on any custom integrations or management tools interfacing with these devices to prevent injection of oversized parameters. 7. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation. 8. Prepare incident response plans specific to industrial control system compromises, including backup and recovery procedures. 9. Educate operational technology (OT) staff about the vulnerability and safe handling practices. 10. Consider deploying virtual patching or application-layer gateways that can sanitize inputs before they reach vulnerable devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-10-15T12:06:18.604Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ee9715ae7112264cd39bd

Added to database: 12/2/2025, 1:28:17 PM

Last enriched: 12/2/2025, 1:43:51 PM

Last updated: 1/16/2026, 10:09:21 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats