Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48826: CWE-134: Use of Externally-Controlled Format String in Planet WGR-500

0
High
VulnerabilityCVE-2025-48826cvecve-2025-48826cwe-134
Published: Tue Oct 07 2025 (10/07/2025, 13:55:06 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

CVE-2025-48826 is a high-severity format string vulnerability in the Planet WGR-500 router firmware version v1. 3411b190912. The flaw exists in the formPingCmd functionality, where an attacker can send a specially crafted series of HTTP requests to trigger memory corruption. This vulnerability allows remote attackers with low privileges to execute arbitrary code, cause denial of service, or compromise the device's confidentiality, integrity, and availability without requiring user interaction. Although no known exploits are currently in the wild, the ease of exploitation and the critical impact make this a significant threat. European organizations using the affected Planet WGR-500 routers could face severe operational disruptions and data breaches if targeted. Mitigation requires firmware updates or network-level protections to block malicious HTTP requests targeting the vulnerable functionality. Countries with higher adoption of Planet networking equipment and critical infrastructure relying on these devices are at greater risk.

AI-Powered Analysis

AILast updated: 10/07/2025, 16:00:54 UTC

Technical Analysis

CVE-2025-48826 is a format string vulnerability classified under CWE-134, found in the formPingCmd functionality of the Planet WGR-500 router firmware version v1.3411b190912. Format string vulnerabilities occur when user-controllable input is unsafely used as a format string parameter in functions like printf, leading to memory corruption. In this case, an attacker can send a series of specially crafted HTTP requests to the router's web interface, exploiting the vulnerability to corrupt memory. This can result in arbitrary code execution, denial of service, or unauthorized disclosure/modification of sensitive data. The vulnerability requires network access and low privileges (PR:L), does not require user interaction (UI:N), and affects confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score is 8.8, indicating high severity. No patches or exploits are currently reported, but the vulnerability's nature and ease of exploitation make it a critical concern for affected devices. The vulnerability's exploitation scope is limited to the specific firmware version, but given the router's deployment in various environments, the impact can be widespread.

Potential Impact

For European organizations, exploitation of CVE-2025-48826 could lead to significant operational disruptions, including denial of service of critical network infrastructure. Confidential data passing through or stored on the affected routers could be exposed or altered, compromising privacy and data integrity. Attackers could gain control over the device, enabling lateral movement within networks or persistent access. This is particularly concerning for sectors relying on Planet WGR-500 routers for secure communications, such as small to medium enterprises, educational institutions, and some government agencies. The high severity and ease of exploitation increase the risk of targeted attacks or automated scanning campaigns. Disruptions could affect business continuity, regulatory compliance (e.g., GDPR), and trust in network security.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement immediate network-level mitigations. These include restricting access to the router's management interface to trusted IP addresses only, preferably via VPN or internal networks. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious HTTP requests targeting the formPingCmd functionality. Monitor network traffic for unusual patterns indicative of exploitation attempts. Disable or restrict the vulnerable functionality if possible. Plan for prompt firmware updates once a patch is released by Planet. Additionally, conduct asset inventories to identify all devices running the affected firmware version and prioritize their remediation. Employ network segmentation to limit potential lateral movement if a device is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:23:06.713Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e535a2a677756fc9944455

Added to database: 10/7/2025, 3:45:38 PM

Last enriched: 10/7/2025, 4:00:54 PM

Last updated: 10/7/2025, 5:14:23 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats