CVE-2025-44894: n/a
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.
AI Analysis
Technical Summary
CVE-2025-44894 is a critical stack overflow vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The flaw exists in the handling of the radDftParamKey parameter within the web_radiusSrv_dftParam_post function. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This vulnerability is classified under CWE-121, which pertains to stack-based buffer overflows. Exploiting this vulnerability requires no authentication or user interaction, and it can be triggered remotely over the network (AV:N). The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow an attacker to execute arbitrary code, potentially taking full control of the affected device or causing denial of service. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability. The affected product appears to be a network device or appliance firmware, likely related to wireless or network gateway systems given the naming convention (FW-WGS-804HPT). The lack of vendor or product name limits precise identification, but the vulnerability's nature suggests it targets embedded network infrastructure devices that handle RADIUS server parameters via a web interface.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Devices running the vulnerable firmware could be compromised remotely without authentication, allowing attackers to gain unauthorized access, disrupt network services, or pivot to internal networks. This could lead to data breaches, service outages, and loss of control over critical network components. Industries relying heavily on secure network access, such as telecommunications, finance, healthcare, and government agencies, are particularly at risk. The compromise of such devices could facilitate espionage, data exfiltration, or sabotage. Given the criticality and remote exploitability, the vulnerability could be leveraged in targeted attacks or widespread automated campaigns once exploit code becomes available. The lack of patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls and monitoring.
Mitigation Recommendations
1. Immediate network segmentation: Isolate devices running the FW-WGS-804HPT firmware from critical network segments and restrict access to the management interfaces to trusted administrative hosts only. 2. Deploy strict firewall rules: Block inbound traffic to the vulnerable web interface port from untrusted networks, especially the internet. 3. Monitor network traffic: Implement anomaly detection to identify unusual requests targeting the radDftParamKey parameter or web_radiusSrv_dftParam_post function endpoints. 4. Vendor engagement: Contact the device vendor or supplier to obtain firmware updates or patches addressing this vulnerability. If unavailable, consider device replacement or firmware rollback to a non-vulnerable version if feasible. 5. Incident response readiness: Prepare for potential exploitation by enhancing logging on affected devices and network gateways, and establish rapid response procedures. 6. Access control hardening: Enforce strong authentication and authorization policies for device management interfaces to reduce attack surface. 7. Disable unnecessary services: If the web interface or RADIUS server functionality is not required, disable these services to eliminate the attack vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-44894: n/a
Description
FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radDftParamKey parameter in the web_radiusSrv_dftParam_post function.
AI-Powered Analysis
Technical Analysis
CVE-2025-44894 is a critical stack overflow vulnerability identified in the firmware version FW-WGS-804HPT v1.305b241111. The flaw exists in the handling of the radDftParamKey parameter within the web_radiusSrv_dftParam_post function. A stack overflow occurs when the input to this parameter exceeds the buffer size allocated on the stack, leading to memory corruption. This vulnerability is classified under CWE-121, which pertains to stack-based buffer overflows. Exploiting this vulnerability requires no authentication or user interaction, and it can be triggered remotely over the network (AV:N). The vulnerability has a CVSS v3.1 base score of 9.8, indicating critical severity, with impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Successful exploitation could allow an attacker to execute arbitrary code, potentially taking full control of the affected device or causing denial of service. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability. The affected product appears to be a network device or appliance firmware, likely related to wireless or network gateway systems given the naming convention (FW-WGS-804HPT). The lack of vendor or product name limits precise identification, but the vulnerability's nature suggests it targets embedded network infrastructure devices that handle RADIUS server parameters via a web interface.
Potential Impact
For European organizations, this vulnerability poses a significant threat to network infrastructure security. Devices running the vulnerable firmware could be compromised remotely without authentication, allowing attackers to gain unauthorized access, disrupt network services, or pivot to internal networks. This could lead to data breaches, service outages, and loss of control over critical network components. Industries relying heavily on secure network access, such as telecommunications, finance, healthcare, and government agencies, are particularly at risk. The compromise of such devices could facilitate espionage, data exfiltration, or sabotage. Given the criticality and remote exploitability, the vulnerability could be leveraged in targeted attacks or widespread automated campaigns once exploit code becomes available. The lack of patches or vendor advisories at this time increases the urgency for organizations to implement compensating controls and monitoring.
Mitigation Recommendations
1. Immediate network segmentation: Isolate devices running the FW-WGS-804HPT firmware from critical network segments and restrict access to the management interfaces to trusted administrative hosts only. 2. Deploy strict firewall rules: Block inbound traffic to the vulnerable web interface port from untrusted networks, especially the internet. 3. Monitor network traffic: Implement anomaly detection to identify unusual requests targeting the radDftParamKey parameter or web_radiusSrv_dftParam_post function endpoints. 4. Vendor engagement: Contact the device vendor or supplier to obtain firmware updates or patches addressing this vulnerability. If unavailable, consider device replacement or firmware rollback to a non-vulnerable version if feasible. 5. Incident response readiness: Prepare for potential exploitation by enhancing logging on affected devices and network gateways, and establish rapid response procedures. 6. Access control hardening: Enforce strong authentication and authorization policies for device management interfaces to reduce attack surface. 7. Disable unnecessary services: If the web interface or RADIUS server functionality is not required, disable these services to eliminate the attack vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d6c76d4f2164cc92430cd
Added to database: 5/21/2025, 6:02:30 AM
Last enriched: 7/6/2025, 5:26:58 AM
Last updated: 8/10/2025, 10:31:53 PM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.