Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54403: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500

0
High
VulnerabilityCVE-2025-54403cvecve-2025-54403cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 13:55:07 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

Multiple OS command injection vulnerabilities exist in the swctrl functionality of Planet WGR-500 v1.3411b190912. A specially crafted network request can lead to arbitrary command execution. An attacker can send a network request to trigger these vulnerabilities.This command injection is related to the `new_password` request parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:13:38 UTC

Technical Analysis

CVE-2025-54403 is an OS command injection vulnerability identified in the Planet WGR-500 router, version v1.3411b190912. The flaw resides in the swctrl functionality, where the 'new_password' request parameter is improperly sanitized, allowing an attacker to inject arbitrary OS commands. This vulnerability is triggered by sending a specially crafted network request to the device, which does not require user interaction but does require low-level privileges (PR:L). The vulnerability is classified under CWE-78, indicating improper neutralization of special elements used in OS commands. The CVSS 3.1 base score of 8.8 reflects its critical impact on confidentiality, integrity, and availability, as arbitrary command execution can lead to full device compromise, data leakage, or denial of service. Although no known exploits are currently in the wild, the vulnerability's network accessibility and low attack complexity make it a significant risk. The lack of available patches at the time of publication increases exposure. The vulnerability affects a specific firmware version, so organizations running this version are at risk. Attackers could leverage this flaw to pivot within networks, disrupt operations, or exfiltrate sensitive information. The vulnerability's presence in networking equipment used in enterprise and industrial environments amplifies its potential impact.

Potential Impact

For European organizations, the impact of CVE-2025-54403 can be severe. Compromise of Planet WGR-500 routers could lead to unauthorized network access, interception or manipulation of traffic, and disruption of critical network services. This can affect confidentiality by exposing sensitive data traversing the device, integrity by allowing attackers to alter configurations or data, and availability by causing device crashes or network outages. Organizations relying on these routers for perimeter defense, VPN termination, or internal segmentation could see significant operational disruption. Critical infrastructure sectors such as energy, manufacturing, and telecommunications that use Planet devices may face heightened risks, including potential cascading effects on dependent systems. The vulnerability’s exploitation could facilitate lateral movement within networks, enabling attackers to escalate privileges or deploy ransomware. Given the router’s role in network connectivity, exploitation could also impact remote work capabilities and business continuity. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Immediately identify and inventory all Planet WGR-500 devices running firmware version v1.3411b190912 within the network. 2. Restrict access to the management interfaces of these devices to trusted IP addresses only, ideally via VPN or secure management networks. 3. Implement network segmentation to isolate vulnerable devices from critical systems and sensitive data flows. 4. Monitor network traffic for anomalous or suspicious requests targeting the swctrl functionality, especially those containing the 'new_password' parameter. 5. Apply any available firmware updates or patches from Planet as soon as they are released; if no patch is available, consider temporary device replacement or disabling vulnerable services. 6. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect command injection attempts. 7. Enforce strong authentication and authorization controls to limit privileges required to access vulnerable functionality. 8. Conduct regular security assessments and penetration tests focusing on network devices to detect exploitation attempts. 9. Maintain up-to-date backups of device configurations to enable rapid recovery if compromise occurs. 10. Engage with Planet support channels to receive timely updates and guidance on vulnerability remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:20:00.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e52784a677756fc992c20a

Added to database: 10/7/2025, 2:45:24 PM

Last enriched: 11/3/2025, 6:13:38 PM

Last updated: 11/21/2025, 7:15:05 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats