CVE-2025-54403: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500
Multiple OS command injection vulnerabilities exist in the swctrl functionality of Planet WGR-500 v1.3411b190912. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is related to the `new_password` request parameter.
AI Analysis
Technical Summary
CVE-2025-54403 is an OS command injection vulnerability identified in the Planet WGR-500 router, version v1.3411b190912. The flaw resides in the swctrl functionality, where the 'new_password' request parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This vulnerability is triggered by sending a specially crafted network request to the device, which does not require user interaction but does require low-level privileges (PR:L). The vulnerability is classified under CWE-78, indicating improper neutralization of special elements used in OS commands. The CVSS 3.1 base score of 8.8 reflects its critical impact on confidentiality, integrity, and availability, as arbitrary command execution can lead to full device compromise, data leakage, or denial of service. Although no known exploits are currently in the wild, the vulnerability's network accessibility and low attack complexity make it a significant risk. The lack of available patches at the time of publication increases exposure. The vulnerability affects a specific firmware version, so organizations running this version are at risk. Attackers could leverage this flaw to pivot within networks, disrupt operations, or exfiltrate sensitive information. The vulnerability's presence in networking equipment used in enterprise and industrial environments amplifies its potential impact.
Potential Impact
For European organizations, the impact of CVE-2025-54403 can be severe. Compromise of Planet WGR-500 routers could lead to unauthorized network access, interception or manipulation of traffic, and disruption of critical network services. This can affect confidentiality by exposing sensitive data traversing the device, integrity by allowing attackers to alter configurations or data, and availability by causing device crashes or network outages. Organizations relying on these routers for perimeter defense, VPN termination, or internal segmentation could see significant operational disruption. Critical infrastructure sectors such as energy, manufacturing, and telecommunications that use Planet devices may face heightened risks, including potential cascading effects on dependent systems. The vulnerability’s exploitation could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. Given the router’s role in network connectivity, exploitation could also impact remote work capabilities and business continuity. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Immediately identify and inventory all Planet WGR-500 devices running firmware version v1.3411b190912 within the network. 2. Restrict access to the management interfaces of these devices to trusted IP addresses only, ideally via VPN or secure management networks. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data flows. 4. Monitor network traffic for anomalous or suspicious requests targeting the swctrl functionality, especially those containing the 'new_password' parameter. 5. Apply any available firmware updates or patches from Planet as soon as they are released; if no patch is available, consider temporary device replacement or disabling vulnerable services. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect command injection attempts. 7. Enforce strong authentication and authorization controls to limit privileges required to access vulnerable functionality. 8. Conduct regular security assessments and penetration tests focusing on network devices to detect exploitation attempts. 9. Maintain up-to-date backups of device configurations to enable rapid recovery if compromise occurs. 10. Engage with Planet support channels to receive timely updates and guidance on vulnerability remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-54403: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500
Description
Multiple OS command injection vulnerabilities exist in the swctrl functionality of Planet WGR-500 v1.3411b190912. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is related to the `new_password` request parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-54403 is an OS command injection vulnerability identified in the Planet WGR-500 router, version v1.3411b190912. The flaw resides in the swctrl functionality, where the 'new_password' request parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This vulnerability is triggered by sending a specially crafted network request to the device, which does not require user interaction but does require low-level privileges (PR:L). The vulnerability is classified under CWE-78, indicating improper neutralization of special elements used in OS commands. The CVSS 3.1 base score of 8.8 reflects its critical impact on confidentiality, integrity, and availability, as arbitrary command execution can lead to full device compromise, data leakage, or denial of service. Although no known exploits are currently in the wild, the vulnerability's network accessibility and low attack complexity make it a significant risk. The lack of available patches at the time of publication increases exposure. The vulnerability affects a specific firmware version, so organizations running this version are at risk. Attackers could leverage this flaw to pivot within networks, disrupt operations, or exfiltrate sensitive information. The vulnerability's presence in networking equipment used in enterprise and industrial environments amplifies its potential impact.
Potential Impact
For European organizations, the impact of CVE-2025-54403 can be severe. Compromise of Planet WGR-500 routers could lead to unauthorized network access, interception or manipulation of traffic, and disruption of critical network services. This can affect confidentiality by exposing sensitive data traversing the device, integrity by allowing attackers to alter configurations or data, and availability by causing device crashes or network outages. Organizations relying on these routers for perimeter defense, VPN termination, or internal segmentation could see significant operational disruption. Critical infrastructure sectors such as energy, manufacturing, and telecommunications that use Planet devices may face heightened risks, including potential cascading effects on dependent systems. The vulnerability’s exploitation could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. Given the router’s role in network connectivity, exploitation could also impact remote work capabilities and business continuity. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.
Mitigation Recommendations
1. Immediately identify and inventory all Planet WGR-500 devices running firmware version v1.3411b190912 within the network. 2. Restrict access to the management interfaces of these devices to trusted IP addresses only, ideally via VPN or secure management networks. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data flows. 4. Monitor network traffic for anomalous or suspicious requests targeting the swctrl functionality, especially those containing the 'new_password' parameter. 5. Apply any available firmware updates or patches from Planet as soon as they are released; if no patch is available, consider temporary device replacement or disabling vulnerable services. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect command injection attempts. 7. Enforce strong authentication and authorization controls to limit privileges required to access vulnerable functionality. 8. Conduct regular security assessments and penetration tests focusing on network devices to detect exploitation attempts. 9. Maintain up-to-date backups of device configurations to enable rapid recovery if compromise occurs. 10. Engage with Planet support channels to receive timely updates and guidance on vulnerability remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-21T21:20:00.389Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e52784a677756fc992c20a
Added to database: 10/7/2025, 2:45:24 PM
Last enriched: 11/3/2025, 6:13:38 PM
Last updated: 11/21/2025, 7:15:05 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62608: CWE-122: Heap-based Buffer Overflow in ml-explore mlx
MediumCVE-2025-62609: CWE-476: NULL Pointer Dereference in ml-explore mlx
MediumCVE-2025-48502: CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input in AMD AMD μProf
MediumCVE-2025-64767: CWE-323: Reusing a Nonce, Key Pair in Encryption in dajiaji hpke-js
CriticalCVE-2025-29934: CWE-459 Incomplete Cleanup in AMD AMD EPYC™ 9004 Series Processors
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.