Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54404: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500

0
High
VulnerabilityCVE-2025-54404cvecve-2025-54404cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 13:55:08 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

CVE-2025-54404 is a high-severity OS command injection vulnerability found in the Planet WGR-500 router, version v1. 3411b190912. The flaw exists in the swctrl functionality, specifically related to the 'new_device_name' network request parameter. An attacker with network access and low privileges can send a specially crafted request to execute arbitrary OS commands without user interaction. This vulnerability impacts confidentiality, integrity, and availability of affected devices. No known exploits are currently observed in the wild. The vulnerability is critical for organizations relying on Planet WGR-500 devices, especially in network infrastructure roles. Mitigation requires patching or applying vendor-provided fixes once available, and restricting network access to management interfaces. European countries with higher deployment of Planet networking equipment and critical infrastructure using these devices are at greater risk. Given the ease of exploitation and potential impact, this vulnerability demands urgent attention from defenders.

AI-Powered Analysis

AILast updated: 10/07/2025, 15:00:43 UTC

Technical Analysis

CVE-2025-54404 is an OS command injection vulnerability classified under CWE-78, affecting the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability resides in the swctrl functionality, where improper neutralization of special elements in the 'new_device_name' network request parameter allows an attacker to inject arbitrary operating system commands. This occurs because the input is not properly sanitized before being passed to system-level command execution functions. Exploitation requires sending a crafted network request to the vulnerable device, which can be done remotely without user interaction but requires low-level privileges (PR:L). The CVSS v3.1 score is 8.8, indicating a high severity with network attack vector, low attack complexity, and no user interaction needed. Successful exploitation can lead to full compromise of the device, allowing attackers to execute arbitrary commands, potentially leading to data theft, device manipulation, or denial of service. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a significant threat. The lack of available patches at the time of publication increases the urgency for mitigations. This vulnerability is particularly critical for organizations using Planet WGR-500 devices in their network infrastructure, as compromised routers can serve as a foothold for further network intrusion or disruption.

Potential Impact

For European organizations, the impact of CVE-2025-54404 can be substantial. The Planet WGR-500 is used in various enterprise and industrial network environments, including small to medium-sized businesses and some critical infrastructure sectors. Exploitation can lead to unauthorized command execution on network devices, resulting in loss of confidentiality (data interception or exfiltration), integrity (alteration of device configurations or network traffic), and availability (device or network service disruption). This can compromise the entire network segment managed by the vulnerable device, potentially enabling lateral movement by attackers. Given the high CVSS score and the network-based attack vector, attackers can exploit this vulnerability remotely, increasing the risk of widespread impact. European organizations with limited network segmentation or exposed management interfaces are particularly vulnerable. Additionally, sectors such as manufacturing, energy, and telecommunications, which often rely on embedded network devices like the WGR-500, face heightened risks of operational disruption and data breaches.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting network access to the management interfaces of Planet WGR-500 devices, ideally limiting access to trusted internal networks or VPNs. 2. Implement strict input validation and filtering at network boundaries to detect and block suspicious payloads targeting the 'new_device_name' parameter. 3. Monitor network traffic for anomalous requests that could indicate exploitation attempts. 4. Apply vendor patches or firmware updates as soon as they become available; if no patches exist, consider temporary device replacement or segmentation to isolate vulnerable devices. 5. Employ network segmentation to limit the impact of a compromised device, ensuring that critical systems are not directly accessible through vulnerable routers. 6. Conduct regular vulnerability assessments and penetration testing focusing on network devices to identify and remediate similar issues proactively. 7. Maintain up-to-date asset inventories to identify all Planet WGR-500 devices in use and prioritize their remediation. 8. Educate network administrators about the risks of command injection vulnerabilities and the importance of secure device configuration and access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:20:00.389Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e52784a677756fc992c20d

Added to database: 10/7/2025, 2:45:24 PM

Last enriched: 10/7/2025, 3:00:43 PM

Last updated: 10/7/2025, 5:13:20 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats