Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54405: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500

0
High
VulnerabilityCVE-2025-54405cvecve-2025-54405cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 13:55:04 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `ipaddr` request parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:14:15 UTC

Technical Analysis

CVE-2025-54405 is an OS command injection vulnerability categorized under CWE-78, found in the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability arises from improper neutralization of special elements in the 'ipaddr' parameter within the formPingCmd HTTP request handler. This flaw allows an attacker to inject arbitrary operating system commands by sending a series of crafted HTTP requests to the device’s web interface. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N). Successful exploitation can lead to full compromise of the device, enabling attackers to execute arbitrary commands with the privileges of the web server process, potentially leading to data theft, device manipulation, or network pivoting. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability’s characteristics make it a critical risk for affected deployments. The lack of available patches at the time of publication necessitates immediate mitigation through access controls and monitoring. This vulnerability highlights the risks of insufficient input validation in embedded device management interfaces, a common attack vector in IoT and networking equipment.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized control over Planet WGR-500 routers, leading to severe consequences including interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. Confidential data passing through or stored on these devices could be exposed or altered, undermining data privacy and integrity obligations under regulations such as GDPR. Availability of network services could be compromised, impacting business continuity and operational technology environments. Given the router’s role in network connectivity, attackers could use compromised devices as footholds for further attacks, including ransomware or espionage campaigns. The high CVSS score indicates that the impact spans confidentiality, integrity, and availability, making this a critical concern for sectors relying on secure and stable network infrastructure, such as finance, healthcare, government, and telecommunications within Europe.

Mitigation Recommendations

1. Immediately restrict access to the management interface of Planet WGR-500 devices to trusted networks only, using network segmentation and firewall rules. 2. Disable remote management features if not strictly necessary to reduce the attack surface. 3. Monitor HTTP traffic to the device for anomalous or suspicious requests targeting the formPingCmd functionality, particularly those manipulating the 'ipaddr' parameter. 4. Implement strict input validation and filtering at network perimeters to detect and block injection attempts. 5. Engage with the vendor to obtain and apply firmware updates or patches as soon as they become available. 6. If patching is delayed, consider temporary device replacement or isolation from critical network segments. 7. Conduct regular security audits and vulnerability assessments on network devices to identify similar weaknesses. 8. Educate network administrators on the risks of command injection vulnerabilities and best practices for device hardening. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:26:03.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e535a2a677756fc9944458

Added to database: 10/7/2025, 3:45:38 PM

Last enriched: 11/3/2025, 6:14:15 PM

Last updated: 11/20/2025, 11:05:41 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats