Skip to main content

CVE-2025-44885: n/a

Critical
VulnerabilityCVE-2025-44885cvecve-2025-44885
Published: Tue May 20 2025 (05/20/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the remote_ip parameter in the web_snmpv3_remote_engineId_add_post function.

AI-Powered Analysis

AILast updated: 07/06/2025, 05:10:22 UTC

Technical Analysis

CVE-2025-44885 is a critical stack overflow vulnerability identified in the FW-WGS-804HPT device firmware version 1.305b241111. The flaw exists in the web_snmpv3_remote_engineId_add_post function, specifically triggered via the remote_ip parameter. A stack overflow occurs when the input data exceeds the buffer capacity allocated on the call stack, leading to memory corruption. This vulnerability allows an unauthenticated remote attacker to send specially crafted requests to the affected device's web interface, causing the stack overflow. Given the CVSS 3.1 base score of 9.8, the vulnerability is exploitable over the network without any authentication or user interaction, and it impacts confidentiality, integrity, and availability. Exploiting this flaw could enable remote code execution, allowing attackers to take full control of the device, disrupt operations, or exfiltrate sensitive information. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a common and severe software weakness. No patches or mitigations have been published yet, and there are no known exploits in the wild as of the publication date. The affected product is a network device (likely a router or gateway) identified as FW-WGS-804HPT, though no vendor or broader product family information is provided. The lack of vendor details complicates immediate mitigation and attribution efforts.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on the FW-WGS-804HPT device or similar network infrastructure components. Compromise of such devices can lead to network disruption, interception of sensitive communications, and lateral movement within corporate networks. Critical infrastructure providers, telecommunications companies, and enterprises with extensive network deployments could face operational outages and data breaches. The ability to remotely exploit without authentication increases the attack surface, making it easier for threat actors to target vulnerable devices. Given Europe's stringent data protection regulations like GDPR, any breach resulting from this vulnerability could lead to severe legal and financial consequences. Additionally, the disruption of network services can impact business continuity and critical services, particularly in sectors such as finance, healthcare, and government.

Mitigation Recommendations

Organizations should immediately identify any deployment of the FW-WGS-804HPT device within their networks. Network segmentation should be enforced to isolate vulnerable devices from critical systems. Access to device management interfaces should be restricted using firewall rules and VPNs to limit exposure to untrusted networks. Monitoring network traffic for anomalous SNMPv3 requests, especially those targeting the remote_ip parameter, can help detect exploitation attempts. Until an official patch is released, consider disabling or restricting SNMPv3 remote management features if feasible. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploit attempts. Engage with the device vendor or supplier to obtain firmware updates or security advisories. Finally, maintain comprehensive backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ce08d4d7c5ea9f4b389eb

Added to database: 5/20/2025, 8:05:33 PM

Last enriched: 7/6/2025, 5:10:22 AM

Last updated: 8/11/2025, 4:32:57 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats