Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41730: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches

0
Critical
VulnerabilityCVE-2025-41730cvecve-2025-41730cwe-121
Published: Wed Dec 10 2025 (12/10/2025, 11:04:13 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: Indsutrial-Managed-Switches

Description

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.

AI-Powered Analysis

AILast updated: 12/24/2025, 11:40:22 UTC

Technical Analysis

CVE-2025-41730 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting WAGO Industrial-Managed-Switches. The root cause is unsafe usage of the sscanf function within the check_account() function, which fails to properly validate input length before copying data into fixed-size stack buffers. This unchecked input handling allows an unauthenticated remote attacker to craft malicious input that overflows the buffer, overwriting adjacent memory on the stack. Such memory corruption can lead to arbitrary code execution, enabling the attacker to gain full control over the affected device. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its severity and ease of exploitation. The affected product is critical infrastructure hardware used in industrial network environments, where device compromise can disrupt operations or serve as a pivot point for further network intrusion. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges. Although no patches have been released yet and no active exploits have been reported, the vulnerability's critical nature demands urgent attention from operators of WAGO switches. The vulnerability was publicly disclosed on December 10, 2025, with the initial reservation date in April 2025. Given the industrial context, exploitation could have severe operational and safety consequences.

Potential Impact

For European organizations, especially those in manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant threat. Compromise of WAGO Industrial-Managed-Switches can lead to unauthorized control over network traffic, disruption of industrial processes, and potential safety hazards. Attackers could intercept, modify, or block communications between industrial control systems, causing operational downtime or physical damage. The ability to execute arbitrary code remotely without authentication increases the risk of widespread attacks, including ransomware or sabotage campaigns targeting European industrial environments. Additionally, compromised switches could be leveraged as footholds for lateral movement within enterprise networks, threatening broader IT and OT infrastructure. The lack of available patches means organizations must rely on network-level mitigations and monitoring to reduce exposure. Given Europe's strong industrial base and reliance on automation, the impact could be substantial, affecting supply chains and critical services.

Mitigation Recommendations

1. Immediate network segmentation: Isolate WAGO Industrial-Managed-Switches from general IT networks and restrict access to trusted management stations only. 2. Deploy strict firewall rules to block unauthorized inbound traffic to the management interfaces of these switches. 3. Implement network intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect exploitation attempts targeting sscanf or buffer overflow patterns. 4. Monitor device logs and network traffic for unusual activity indicative of exploitation attempts. 5. Coordinate with WAGO for timely patch releases and apply firmware updates as soon as they become available. 6. Conduct regular security audits and vulnerability assessments focusing on industrial network devices. 7. Employ application-layer gateways or proxies that can sanitize or validate inputs to the vulnerable functions if feasible. 8. Train operational technology (OT) staff to recognize signs of compromise and respond promptly. 9. Maintain offline backups and incident response plans specific to industrial control system environments. These targeted measures go beyond generic advice by focusing on network isolation, monitoring, and proactive coordination with the vendor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.319Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69395606e27bef3ae4b6914e

Added to database: 12/10/2025, 11:14:14 AM

Last enriched: 12/24/2025, 11:40:22 AM

Last updated: 2/7/2026, 9:01:53 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats