CVE-2025-44883: n/a
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the tacIp parameter in the web_tacplus_serverEdit_post function.
AI Analysis
Technical Summary
CVE-2025-44883 is a critical security vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The vulnerability is a stack-based buffer overflow occurring in the tacIp parameter within the web_tacplus_serverEdit_post function. This function likely handles TACACS+ server configuration via a web interface. The stack overflow (CWE-121) allows an attacker to overwrite the call stack, potentially enabling arbitrary code execution, denial of service, or system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating it is critical with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation can be performed remotely without authentication or user interaction, making it highly dangerous. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a significant threat. The lack of vendor and product information limits precise identification, but the firmware version suggests a network device, possibly a router or firewall appliance, which is commonly used in enterprise environments. The vulnerability could allow attackers to gain full control over the affected device, leading to network infiltration, data exfiltration, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on the affected firmware in critical network infrastructure such as routers, firewalls, or TACACS+ authentication servers. Successful exploitation could lead to complete device compromise, enabling attackers to intercept or manipulate sensitive communications, disrupt network availability, or pivot to internal systems. This could impact confidentiality of personal and corporate data, integrity of network configurations, and availability of essential services. Given the critical nature of the vulnerability and the lack of required authentication, attackers could exploit this remotely, increasing the risk of widespread attacks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the potential for significant operational and reputational damage. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score suggests attackers may develop exploits rapidly.
Mitigation Recommendations
1. Immediate identification and inventory of devices running FW-WGS-804HPT v1.305b241111 firmware or similar versions is essential. 2. Since no patch links are currently available, organizations should contact the device vendor or manufacturer urgently to obtain firmware updates or security advisories addressing this vulnerability. 3. Implement network segmentation and restrict access to the management interfaces of affected devices, limiting exposure to trusted administrative networks only. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection capabilities to monitor for suspicious TACACS+ related traffic or malformed requests targeting the tacIp parameter. 5. Enforce strict network access controls and multi-factor authentication for device management to reduce risk from lateral movement if exploitation occurs. 6. Monitor logs and alerts for unusual activity related to TACACS+ server configuration changes or web interface access. 7. Prepare incident response plans specifically for network device compromise scenarios, including rapid isolation and forensic analysis. 8. Educate network administrators about this vulnerability and encourage vigilance until patches are available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-44883: n/a
Description
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the tacIp parameter in the web_tacplus_serverEdit_post function.
AI-Powered Analysis
Technical Analysis
CVE-2025-44883 is a critical security vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The vulnerability is a stack-based buffer overflow occurring in the tacIp parameter within the web_tacplus_serverEdit_post function. This function likely handles TACACS+ server configuration via a web interface. The stack overflow (CWE-121) allows an attacker to overwrite the call stack, potentially enabling arbitrary code execution, denial of service, or system compromise. The vulnerability has a CVSS v3.1 base score of 9.8, indicating it is critical with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploitation can be performed remotely without authentication or user interaction, making it highly dangerous. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a significant threat. The lack of vendor and product information limits precise identification, but the firmware version suggests a network device, possibly a router or firewall appliance, which is commonly used in enterprise environments. The vulnerability could allow attackers to gain full control over the affected device, leading to network infiltration, data exfiltration, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially for those relying on the affected firmware in critical network infrastructure such as routers, firewalls, or TACACS+ authentication servers. Successful exploitation could lead to complete device compromise, enabling attackers to intercept or manipulate sensitive communications, disrupt network availability, or pivot to internal systems. This could impact confidentiality of personal and corporate data, integrity of network configurations, and availability of essential services. Given the critical nature of the vulnerability and the lack of required authentication, attackers could exploit this remotely, increasing the risk of widespread attacks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the potential for significant operational and reputational damage. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score suggests attackers may develop exploits rapidly.
Mitigation Recommendations
1. Immediate identification and inventory of devices running FW-WGS-804HPT v1.305b241111 firmware or similar versions is essential. 2. Since no patch links are currently available, organizations should contact the device vendor or manufacturer urgently to obtain firmware updates or security advisories addressing this vulnerability. 3. Implement network segmentation and restrict access to the management interfaces of affected devices, limiting exposure to trusted administrative networks only. 4. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection capabilities to monitor for suspicious TACACS+ related traffic or malformed requests targeting the tacIp parameter. 5. Enforce strict network access controls and multi-factor authentication for device management to reduce risk from lateral movement if exploitation occurs. 6. Monitor logs and alerts for unusual activity related to TACACS+ server configuration changes or web interface access. 7. Prepare incident response plans specifically for network device compromise scenarios, including rapid isolation and forensic analysis. 8. Educate network administrators about this vulnerability and encourage vigilance until patches are available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ce77b4d7c5ea9f4b397b3
Added to database: 5/20/2025, 8:35:07 PM
Last enriched: 7/6/2025, 5:25:08 AM
Last updated: 8/16/2025, 5:33:39 AM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.