Skip to main content

CVE-2025-43984: n/a

Critical
VulnerabilityCVE-2025-43984cvecve-2025-43984
Published: Thu Aug 14 2025 (08/14/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on KuWFi GC111 devices (Hardware Version: CPE-LM321_V3.2, Software Version: GC111-GL-LM321_V3.0_20191211). They are vulnerable to unauthenticated /goform/goform_set_cmd_process requests. A crafted POST request, using the SSID parameter, allows remote attackers to execute arbitrary OS commands with root privileges.

AI-Powered Analysis

AILast updated: 08/22/2025, 01:10:14 UTC

Technical Analysis

CVE-2025-43984 is a critical remote code execution vulnerability affecting KuWFi GC111 devices, specifically hardware version CPE-LM321_V3.2 and software version GC111-GL-LM321_V3.0_20191211. The vulnerability arises from improper handling of unauthenticated HTTP POST requests to the /goform/goform_set_cmd_process endpoint. Attackers can craft a POST request with a malicious SSID parameter that is processed by the device without authentication, allowing arbitrary operating system command execution with root privileges. This vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that the device fails to sanitize input before passing it to OS commands. The CVSS v3.1 base score is 9.8, reflecting its critical severity due to network attack vector (AV:N), no required privileges (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation does not require authentication or user interaction, making it highly exploitable remotely. Although no known exploits are currently reported in the wild, the vulnerability presents a significant risk for remote attackers to gain full control over affected devices, potentially leading to device takeover, network pivoting, data exfiltration, or denial of service. The lack of available patches or mitigations at the time of disclosure further exacerbates the risk.

Potential Impact

For European organizations, this vulnerability poses a severe threat, especially for those deploying KuWFi GC111 devices in their network infrastructure, such as in branch offices, remote sites, or IoT environments. Successful exploitation could lead to complete compromise of the affected device, allowing attackers to execute arbitrary commands with root privileges. This can result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of network services, and use of compromised devices as footholds for lateral movement or launching further attacks. Given the critical nature and ease of exploitation, organizations could face operational downtime, data breaches, and reputational damage. The impact is particularly acute for sectors relying on secure and stable network connectivity, including telecommunications, manufacturing, healthcare, and critical infrastructure providers. Additionally, the vulnerability could be leveraged by threat actors for espionage or sabotage, especially in the context of geopolitical tensions involving European entities.

Mitigation Recommendations

Immediate mitigation steps include isolating affected KuWFi GC111 devices from untrusted networks to prevent external exploitation. Network segmentation should be enforced to limit device exposure. Organizations should monitor network traffic for suspicious POST requests targeting /goform/goform_set_cmd_process and implement intrusion detection/prevention rules to block such attempts. If possible, disable or restrict access to the vulnerable endpoint via device configuration or firewall rules. Since no official patches are available, organizations should engage with the vendor for updates or consider device replacement where feasible. Additionally, applying network-level protections such as VPNs, strong authentication, and access control lists can reduce risk. Regularly auditing device firmware versions and maintaining an asset inventory will aid in identifying and prioritizing vulnerable devices. Finally, organizations should prepare incident response plans specific to IoT and network device compromises to quickly contain and remediate potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-21T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 689dec89ad5a09ad005b6874

Added to database: 8/14/2025, 2:02:49 PM

Last enriched: 8/22/2025, 1:10:14 AM

Last updated: 9/26/2025, 7:34:39 PM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats