Skip to main content

CVE-2025-46272: CWE-78 OS Command Injection in Planet Technology WGS-804HPT-V2

Medium
Published: Thu Apr 24 2025 (04/24/2025, 22:56:13 UTC)
Source: CVE
Vendor/Project: Planet Technology
Product: WGS-804HPT-V2

Description

WGS-80HPT-V2 and WGS-4215-8T2S are vulnerable to a command injection attack that could allow an unauthenticated attacker to execute OS commands on the host system.

AI-Powered Analysis

AILast updated: 06/24/2025, 13:42:48 UTC

Technical Analysis

CVE-2025-46272 is a security vulnerability identified in Planet Technology's WGS-804HPT-V2 and WGS-4215-8T2S devices, which are network devices likely used in industrial or enterprise environments. The vulnerability is classified as CWE-78, indicating an OS command injection flaw. This type of vulnerability allows an attacker to inject arbitrary operating system commands through unsanitized input fields or parameters processed by the device's software. Notably, this vulnerability can be exploited by an unauthenticated attacker, meaning no prior access or credentials are required to launch an attack. Successful exploitation would enable the attacker to execute arbitrary OS commands on the host system, potentially gaining control over the device, manipulating its functions, or using it as a foothold for lateral movement within the network. The affected product versions are indicated as '0', which likely means initial or all versions prior to patching are vulnerable. There are no known exploits in the wild at the time of publication, and no patches have been released yet. The vulnerability was reserved and published in April 2025, with enrichment from ICS-CERT, suggesting the device may be used in industrial control systems or critical infrastructure contexts. The lack of authentication requirement and the ability to execute OS commands directly on the device make this a significant security risk, especially in environments where these devices are deployed at network perimeters or in sensitive operational roles.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for those relying on Planet Technology's WGS-804HPT-V2 or WGS-4215-8T2S devices within their network infrastructure. The ability for an unauthenticated attacker to execute arbitrary OS commands could lead to full device compromise, resulting in disruption of network services, interception or manipulation of data, and potential pivoting to other critical systems. In industrial or critical infrastructure sectors, this could translate into operational downtime, safety risks, and regulatory compliance violations under frameworks such as NIS2 or GDPR if personal data or essential services are affected. The absence of known exploits currently reduces immediate risk but also means organizations must proactively address the vulnerability before attackers develop and deploy exploit code. Given the devices' likely role in network management or industrial control, exploitation could affect availability and integrity of services, with confidentiality also at risk if attackers access sensitive configuration or operational data.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement immediate compensating controls. These include isolating affected devices from untrusted networks, especially the internet, by placing them behind firewalls or within segmented network zones with strict access controls. Monitoring network traffic for unusual command injection patterns or unexpected OS command executions can help detect attempted exploitation. Disabling or restricting management interfaces exposed to untrusted users is critical. Organizations should also engage with Planet Technology to obtain timelines for official patches and apply them promptly once released. Additionally, conducting thorough inventories to identify all instances of the affected devices and assessing their exposure will aid in prioritizing remediation efforts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting command injection attempts can provide an additional layer of defense. Finally, organizations should review and harden device configurations to minimize attack surfaces, such as disabling unnecessary services or interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-04-22T15:31:46.237Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf01ef

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 1:42:48 PM

Last updated: 7/28/2025, 9:59:40 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats