CVE-2025-49490: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Resource leak vulnerability in ASR180x in router allows Resource Leak Exposure. This vulnerability is associated with program files router/sms/sms.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI Analysis
Technical Summary
CVE-2025-49490 is a resource leak vulnerability identified in the ASR180x router series, specifically affecting the Falcon_Linux, Kestrel, and Lapwing_Linux products prior to version 1536. The vulnerability is rooted in improper resource shutdown or release, categorized under CWE-404. It is located in the router's SMS handling component, specifically within the source file router/sms/sms.c. The flaw allows resources, such as memory or file handles, to remain allocated after their intended use, leading to resource exhaustion over time. This can degrade router performance or cause denial of service (DoS) conditions due to resource depletion. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector details indicate that the vulnerability can be exploited remotely (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact primarily affects availability (A:L) with limited confidentiality impact (C:L) and no integrity impact (I:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's exploitation would likely involve sending crafted SMS messages or commands to the router's SMS processing subsystem to trigger the resource leak, which could eventually lead to service disruption or degraded network performance.
Potential Impact
For European organizations relying on ASR180x routers running Falcon_Linux, Kestrel, or Lapwing_Linux, this vulnerability poses a risk of network instability and potential denial of service. Resource leaks can accumulate over time, causing routers to exhaust critical system resources, leading to degraded performance or crashes. This can disrupt business operations, especially for organizations with high dependency on continuous network availability such as financial institutions, telecommunications providers, and critical infrastructure operators. The limited confidentiality impact reduces the risk of data exposure; however, the availability impact can indirectly affect data integrity and operational continuity. Given the medium severity and the requirement for low privilege access, attackers with some network access could exploit this vulnerability to degrade service quality or cause outages, potentially impacting service level agreements and regulatory compliance requirements in Europe.
Mitigation Recommendations
Organizations should prioritize upgrading affected ASR180x routers to version 1536 or later once the vendor releases a patch addressing CVE-2025-49490. Until patches are available, network administrators should implement strict access controls to limit low-privilege access to router management interfaces and SMS processing components. Monitoring resource utilization metrics on routers can help detect abnormal resource consumption indicative of exploitation attempts. Network segmentation and firewall rules should restrict unsolicited SMS or management traffic to these devices. Additionally, deploying anomaly detection systems to identify unusual patterns in SMS handling or router performance degradation can provide early warning signs. Regular firmware audits and vulnerability scanning should be integrated into the security lifecycle to ensure timely detection of similar issues. Finally, organizations should engage with the vendor for timely updates and advisories.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
CVE-2025-49490: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
Description
Resource leak vulnerability in ASR180x in router allows Resource Leak Exposure. This vulnerability is associated with program files router/sms/sms.c. This issue affects Falcon_Linux、Kestrel、Lapwing_Linux: before v1536.
AI-Powered Analysis
Technical Analysis
CVE-2025-49490 is a resource leak vulnerability identified in the ASR180x router series, specifically affecting the Falcon_Linux, Kestrel, and Lapwing_Linux products prior to version 1536. The vulnerability is rooted in improper resource shutdown or release, categorized under CWE-404. It is located in the router's SMS handling component, specifically within the source file router/sms/sms.c. The flaw allows resources, such as memory or file handles, to remain allocated after their intended use, leading to resource exhaustion over time. This can degrade router performance or cause denial of service (DoS) conditions due to resource depletion. The CVSS v3.1 base score is 5.4, indicating a medium severity level. The vector details indicate that the vulnerability can be exploited remotely (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) but no user interaction (UI:N). The impact primarily affects availability (A:L) with limited confidentiality impact (C:L) and no integrity impact (I:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's exploitation would likely involve sending crafted SMS messages or commands to the router's SMS processing subsystem to trigger the resource leak, which could eventually lead to service disruption or degraded network performance.
Potential Impact
For European organizations relying on ASR180x routers running Falcon_Linux, Kestrel, or Lapwing_Linux, this vulnerability poses a risk of network instability and potential denial of service. Resource leaks can accumulate over time, causing routers to exhaust critical system resources, leading to degraded performance or crashes. This can disrupt business operations, especially for organizations with high dependency on continuous network availability such as financial institutions, telecommunications providers, and critical infrastructure operators. The limited confidentiality impact reduces the risk of data exposure; however, the availability impact can indirectly affect data integrity and operational continuity. Given the medium severity and the requirement for low privilege access, attackers with some network access could exploit this vulnerability to degrade service quality or cause outages, potentially impacting service level agreements and regulatory compliance requirements in Europe.
Mitigation Recommendations
Organizations should prioritize upgrading affected ASR180x routers to version 1536 or later once the vendor releases a patch addressing CVE-2025-49490. Until patches are available, network administrators should implement strict access controls to limit low-privilege access to router management interfaces and SMS processing components. Monitoring resource utilization metrics on routers can help detect abnormal resource consumption indicative of exploitation attempts. Network segmentation and firewall rules should restrict unsolicited SMS or management traffic to these devices. Additionally, deploying anomaly detection systems to identify unusual patterns in SMS handling or router performance degradation can provide early warning signs. Regular firmware audits and vulnerability scanning should be integrated into the security lifecycle to ensure timely detection of similar issues. Finally, organizations should engage with the vendor for timely updates and advisories.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ASR
- Date Reserved
- 2025-06-06T02:42:06.644Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6863b3da6f40f0eb728ee0fb
Added to database: 7/1/2025, 10:09:30 AM
Last enriched: 7/1/2025, 10:24:32 AM
Last updated: 7/1/2025, 10:24:32 AM
Views: 2
Related Threats
CVE-2025-22624: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in bradvin FooGallery - Responsive Photo Gallery, Image Viewer, Justified, Masonry & Carousel
MediumCVE-2025-5314: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dearhive Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer
MediumCVE-2025-49483: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
MediumCVE-2025-49482: CWE-404 Improper Resource Shutdown or Release in ASR Falcon_Linux、Kestrel、Lapwing_Linux
MediumCVE-2025-6952: Reachable Assertion in Open5GS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.