CVE-2025-54401: CWE-121: Stack-based Buffer Overflow in Planet WGR-500
Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This buffer overflow is related to the `submit-url` request parameter.
AI Analysis
Technical Summary
CVE-2025-54401 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the formPingCmd functionality of the Planet WGR-500 router, version v1.3411b190912. The vulnerability arises from improper handling of the 'submit-url' parameter in HTTP requests, where a specially crafted series of requests can overflow the stack buffer. This overflow can corrupt memory, potentially allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in the CVSS 3.1 score of 8.8. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution. The Planet WGR-500 is a widely used router in small to medium enterprise and possibly some industrial environments. The lack of available patches increases the urgency for mitigation. The vulnerability could be exploited by attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network availability.
Potential Impact
For European organizations, this vulnerability could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Compromise of the WGR-500 routers could serve as a foothold for lateral movement within corporate networks or as a pivot point for launching further attacks. Critical infrastructure and enterprises relying on these routers for secure communications are at heightened risk. The high impact on confidentiality, integrity, and availability means that data breaches, service outages, and potential regulatory non-compliance (e.g., GDPR) could result. The vulnerability's ease of exploitation over the network and lack of required user interaction make it particularly dangerous in environments with exposed management interfaces or insufficient network segmentation.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Disable or restrict the formPingCmd functionality if possible, or any HTTP services that process the 'submit-url' parameter. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the router, especially those containing suspicious 'submit-url' parameters. 4. Conduct an inventory of all Planet WGR-500 devices and verify firmware versions to identify affected units. 5. Engage with the vendor to obtain or expedite security patches; if none are available, consider temporary device replacement or isolation. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 7. Educate network administrators about the vulnerability and enforce strict credential management to reduce the risk of privilege escalation. 8. Regularly audit network devices for unauthorized changes or signs of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-54401: CWE-121: Stack-based Buffer Overflow in Planet WGR-500
Description
Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This buffer overflow is related to the `submit-url` request parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-54401 is a stack-based buffer overflow vulnerability classified under CWE-121, found in the formPingCmd functionality of the Planet WGR-500 router, version v1.3411b190912. The vulnerability arises from improper handling of the 'submit-url' parameter in HTTP requests, where a specially crafted series of requests can overflow the stack buffer. This overflow can corrupt memory, potentially allowing an attacker to execute arbitrary code remotely. The attack vector is network-based (AV:N), requiring low attack complexity (AC:L) and low privileges (PR:L), with no user interaction (UI:N) needed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflected in the CVSS 3.1 score of 8.8. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for remote code execution. The Planet WGR-500 is a widely used router in small to medium enterprise and possibly some industrial environments. The lack of available patches increases the urgency for mitigation. The vulnerability could be exploited by attackers to gain control over the device, intercept or manipulate network traffic, or disrupt network availability.
Potential Impact
For European organizations, this vulnerability could lead to severe consequences including unauthorized access to internal networks, interception of sensitive data, and disruption of network services. Compromise of the WGR-500 routers could serve as a foothold for lateral movement within corporate networks or as a pivot point for launching further attacks. Critical infrastructure and enterprises relying on these routers for secure communications are at heightened risk. The high impact on confidentiality, integrity, and availability means that data breaches, service outages, and potential regulatory non-compliance (e.g., GDPR) could result. The vulnerability's ease of exploitation over the network and lack of required user interaction make it particularly dangerous in environments with exposed management interfaces or insufficient network segmentation.
Mitigation Recommendations
1. Immediately restrict access to the router's management interface by implementing strict firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Disable or restrict the formPingCmd functionality if possible, or any HTTP services that process the 'submit-url' parameter. 3. Monitor network traffic for unusual or malformed HTTP requests targeting the router, especially those containing suspicious 'submit-url' parameters. 4. Conduct an inventory of all Planet WGR-500 devices and verify firmware versions to identify affected units. 5. Engage with the vendor to obtain or expedite security patches; if none are available, consider temporary device replacement or isolation. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability once available. 7. Educate network administrators about the vulnerability and enforce strict credential management to reduce the risk of privilege escalation. 8. Regularly audit network devices for unauthorized changes or signs of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-21T21:08:33.897Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e52784a677756fc992c204
Added to database: 10/7/2025, 2:45:24 PM
Last enriched: 11/3/2025, 6:13:10 PM
Last updated: 11/21/2025, 2:23:10 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
UnknownCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownCVE-2025-66114: Missing Authorization in theme funda Show Variations as Single Products Woocommerce
UnknownCVE-2025-66113: Missing Authorization in ThemeAtelier Better Chat Support for Messenger
UnknownCVE-2025-66112: Missing Authorization in WebToffee Accessibility Toolkit by WebYes
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.