CVE-2025-44894: n/a
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.
AI Analysis
Technical Summary
CVE-2025-44894 is a critical stack overflow vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The flaw exists in the handling of the radDftParamKey parameter within the web_radiusSrv_dftParam_post function. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This vulnerability is classified under CWE-121, which pertains to stack-based buffer overflows. Exploiting this vulnerability requires no authentication or user interaction, and it can be triggered remotely over the network (AV:N). The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow an attacker to execute arbitrary code, potentially taking full control of the affected device or causing denial of service. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability. The affected product appears to be a network device or appliance firmware, likely related to wireless or network gateway systems given the naming convention (FW-WGS-804HPT). The lack of vendor or product name limits precise identification, but the vulnerability's nature suggests it targets embedded network infrastructure devices that handle RADIUS server parameters via a web interface.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Devices running the vulnerable firmware could be compromised remotely without authentication, allowing attackers to gain unauthorized access, disrupt network services, or pivot to internal networks. This could lead to data breaches, service outages, and loss of control over critical network components. Industries relying heavily on secure network access, such as telecommunications, finance, healthcare, and government agencies, are particularly at risk. The compromise of such devices could facilitate espionage, data exfiltration, or sabotage. Given the criticality and remote exploitability, the vulnerability could be leveraged in targeted attacks or widespread automated campaigns once exploit code becomes available. The lack of patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls and monitoring.
Mitigation Recommendations
1. Immediate network segmentation: Isolate devices running the FW-WGS-804HPT firmware from critical network segments and restrict access to the management interfaces to trusted administrative hosts only. 2. Deploy strict firewall rules: Block inbound traffic to the vulnerable web interface port from untrusted networks, especially the internet. 3. Monitor network traffic: Implement anomaly detection to identify unusual requests targeting the radDftParamKey parameter or web_radiusSrv_dftParam_post function endpoints. 4. Vendor engagement: Contact the device vendor or supplier to obtain firmware updates or patches addressing this vulnerability. If unavailable, consider device replacement or firmware rollback to a non-vulnerable version if feasible. 5. Incident response readiness: Prepare for potential exploitation by enhancing logging on affected devices and network gateways, and establish rapid response procedures. 6. Access control hardening: Enforce strong authentication and authorization policies for device management interfaces to reduce attack surface. 7. Disable unnecessary services: If the web interface or RADIUS server functionality is not required, disable these services to eliminate the attack vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-44894: n/a
Description
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.
AI-Powered Analysis
Technical Analysis
CVE-2025-44894 is a critical stack overflow vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The flaw exists in the handling of the radDftParamKey parameter within the web_radiusSrv_dftParam_post function. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This vulnerability is classified under CWE-121, which pertains to stack-based buffer overflows. Exploiting this vulnerability requires no authentication or user interaction, and it can be triggered remotely over the network (AV:N). The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow an attacker to execute arbitrary code, potentially taking full control of the affected device or causing denial of service. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability. The affected product appears to be a network device or appliance firmware, likely related to wireless or network gateway systems given the naming convention (FW-WGS-804HPT). The lack of vendor or product name limits precise identification, but the vulnerability's nature suggests it targets embedded network infrastructure devices that handle RADIUS server parameters via a web interface.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Devices running the vulnerable firmware could be compromised remotely without authentication, allowing attackers to gain unauthorized access, disrupt network services, or pivot to internal networks. This could lead to data breaches, service outages, and loss of control over critical network components. Industries relying heavily on secure network access, such as telecommunications, finance, healthcare, and government agencies, are particularly at risk. The compromise of such devices could facilitate espionage, data exfiltration, or sabotage. Given the criticality and remote exploitability, the vulnerability could be leveraged in targeted attacks or widespread automated campaigns once exploit code becomes available. The lack of patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls and monitoring.
Mitigation Recommendations
1. Immediate network segmentation: Isolate devices running the FW-WGS-804HPT firmware from critical network segments and restrict access to the management interfaces to trusted administrative hosts only. 2. Deploy strict firewall rules: Block inbound traffic to the vulnerable web interface port from untrusted networks, especially the internet. 3. Monitor network traffic: Implement anomaly detection to identify unusual requests targeting the radDftParamKey parameter or web_radiusSrv_dftParam_post function endpoints. 4. Vendor engagement: Contact the device vendor or supplier to obtain firmware updates or patches addressing this vulnerability. If unavailable, consider device replacement or firmware rollback to a non-vulnerable version if feasible. 5. Incident response readiness: Prepare for potential exploitation by enhancing logging on affected devices and network gateways, and establish rapid response procedures. 6. Access control hardening: Enforce strong authentication and authorization policies for device management interfaces to reduce attack surface. 7. Disable unnecessary services: If the web interface or RADIUS server functionality is not required, disable these services to eliminate the attack vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d6c76d4f2164cc92430cd
Added to database: 5/21/2025, 6:02:30 AM
Last enriched: 7/6/2025, 5:26:58 AM
Last updated: 11/19/2025, 11:02:10 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13420: SQL Injection in itsourcecode Human Resource Management System
MediumCVE-2025-4042
UnknownCVE-2025-13415: Cross Site Scripting in icret EasyImages
MediumCVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-63719: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.