Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54401: CWE-121: Stack-based Buffer Overflow in Planet WGR-500

0
High
VulnerabilityCVE-2025-54401cvecve-2025-54401cwe-121
Published: Tue Oct 07 2025 (10/07/2025, 13:55:10 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This buffer overflow is related to the `submit-url` request parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:13:10 UTC

Technical Analysis

CVE-2025-54401 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the formPingCmd functionality of the Planet WGR-500 router, version v1.3411b190912. The vulnerability arises from improper handling of the 'submit-url' parameter in HTTP requests, where a specially crafted series of requests can overflow the stack buffer. This overflow can corrupt memory, potentially allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in the CVSS 3.1 score of 8.8. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution. The Planet WGR-500 is a widely used router in small to medium enterprise and possibly some industrial environments. The lack of available patches increases the urgency for mitigation. The vulnerability could be exploited by attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network availability.

Potential Impact

For European organizations, this vulnerability could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Compromise of the WGR-500 routers could serve as a foothold for lateral movement within corporate networks or as a pivot point for launching further attacks. Critical infrastructure and enterprises relying on these routers for secure communications are at heightened risk. The high impact on confidentiality, integrity, and availability means that data breaches, service outages, and potential regulatory non-compliance (e.g., GDPR) could result. The vulnerability's ease of exploitation over the network and lack of required user interaction make it particularly dangerous in environments with exposed management interfaces or insufficient network segmentation.

Mitigation Recommendations

1. Immediately restrict access to the router's management interface by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Disable or restrict the formPingCmd functionality if possible, or any HTTP services that process the 'submit-url' parameter. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the router, especially those containing suspicious 'submit-url' parameters. 4. Conduct an inventory of all Planet WGR-500 devices and verify firmware versions to identify affected units. 5. Engage with the vendor to obtain or expedite security patches; if none are available, consider temporary device replacement or isolation. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 7. Educate network administrators about the vulnerability and enforce strict credential management to reduce the risk of privilege escalation. 8. Regularly audit network devices for unauthorized changes or signs of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:08:33.897Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e52784a677756fc992c204

Added to database: 10/7/2025, 2:45:24 PM

Last enriched: 11/3/2025, 6:13:10 PM

Last updated: 11/21/2025, 2:23:10 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats