Skip to main content

CVE-2025-44890: n/a

Critical
VulnerabilityCVE-2025-44890cvecve-2025-44890
Published: Tue May 20 2025 (05/20/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip parameter in the web_snmp_notifyv3_add_post function.

AI-Powered Analysis

AILast updated: 07/06/2025, 05:10:35 UTC

Technical Analysis

CVE-2025-44890 is a critical security vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The vulnerability is a stack-based buffer overflow occurring in the function web_snmp_notifyv3_add_post, specifically triggered via the host_ip parameter. A stack overflow (CWE-121) happens when a program writes more data to a buffer located on the stack than it can hold, potentially overwriting adjacent memory and leading to arbitrary code execution, denial of service, or system compromise. This vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is rated high, with a CVSS score of 9.8 out of 10, reflecting the critical nature of this flaw. Exploiting this vulnerability could allow attackers to execute arbitrary code with the privileges of the affected device, potentially leading to full device compromise, interception or manipulation of SNMP notifications, and disruption of network management operations. Although no known exploits are currently reported in the wild, the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The affected product is identified only as FW-WGS-804HPT firmware version 1.305b241111, with no vendor or broader product family specified, which complicates precise identification of impacted devices. The vulnerability was published on May 20, 2025, with the initial reservation date on April 22, 2025. No patches or mitigation links are currently available, indicating that affected organizations must implement interim protective measures until official fixes are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on the FW-WGS-804HPT device or similar network infrastructure components for SNMP-based network management. Successful exploitation could lead to unauthorized control over network devices, disruption of network monitoring and management, and potential lateral movement within corporate networks. This could result in data breaches, operational downtime, and compromised network integrity. Critical infrastructure sectors such as telecommunications, energy, and finance, which often depend on SNMP for device monitoring, could be particularly affected. The lack of authentication and user interaction requirements means that attackers can launch attacks remotely and stealthily, increasing the threat to enterprise and industrial networks across Europe. Additionally, the high severity and potential for full device compromise elevate the risk of cascading failures in interconnected network environments.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately undertake the following specific mitigation steps: 1) Identify and inventory all devices running FW-WGS-804HPT firmware version 1.305b241111 or related variants to assess exposure. 2) Restrict network access to the affected devices by implementing strict firewall rules that limit SNMP traffic and web management interface access only to trusted management stations and IP addresses. 3) Disable SNMPv3 notification features or the vulnerable web_snmp_notifyv3_add_post functionality if possible, or disable SNMP entirely on devices not requiring it. 4) Monitor network traffic for anomalous SNMP requests or unexpected web interface activity targeting the host_ip parameter. 5) Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. 6) Engage with the device vendor or firmware provider to obtain patches or firmware updates as soon as they become available. 7) Plan for rapid deployment of patches and conduct thorough testing to ensure no regression or operational impact. 8) Educate network administrators about the vulnerability and the importance of limiting exposure to management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682ce08d4d7c5ea9f4b389ed

Added to database: 5/20/2025, 8:05:33 PM

Last enriched: 7/6/2025, 5:10:35 AM

Last updated: 7/30/2025, 4:08:12 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats