Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54405: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500

0
High
VulnerabilityCVE-2025-54405cvecve-2025-54405cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 13:55:04 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

CVE-2025-54405 is a high-severity OS command injection vulnerability affecting Planet WGR-500 routers running version v1. 3411b190912. The flaw exists in the formPingCmd functionality, specifically related to the 'ipaddr' HTTP request parameter, allowing an attacker to execute arbitrary OS commands remotely. Exploitation requires sending specially crafted HTTP requests and only requires low privileges without user interaction. This vulnerability impacts confidentiality, integrity, and availability of the affected device. No public exploits are known yet, but the ease of exploitation and critical impact make it a significant threat. European organizations using Planet WGR-500 devices should prioritize patching or mitigating this issue. Countries with higher adoption of Planet networking equipment and critical infrastructure relying on these routers are at greater risk. Immediate mitigation steps include network segmentation, restricting management interfaces, and monitoring for suspicious HTTP requests targeting the vulnerable parameter.

AI-Powered Analysis

AILast updated: 10/07/2025, 16:00:40 UTC

Technical Analysis

CVE-2025-54405 is an OS command injection vulnerability identified in the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability arises from improper neutralization of special elements in the 'ipaddr' parameter within the formPingCmd functionality. An attacker can exploit this by sending a series of crafted HTTP requests that inject arbitrary OS commands, leading to full command execution on the device. This flaw is classified under CWE-78, indicating improper input validation that allows command injection. The CVSS v3.1 score is 8.8 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability enables attackers to compromise the router, potentially gaining control over network traffic, intercepting sensitive data, or disrupting network services. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a prime target for attackers once exploit code becomes available. The lack of available patches necessitates immediate mitigation efforts to protect affected devices. This vulnerability is particularly critical for environments relying on Planet WGR-500 routers for network connectivity and security, as exploitation could lead to widespread network compromise.

Potential Impact

For European organizations, exploitation of CVE-2025-54405 could result in severe consequences including unauthorized access to internal networks, interception or manipulation of sensitive communications, and disruption of critical network services. Compromised routers can serve as footholds for lateral movement within corporate or governmental networks, potentially leading to data breaches or sabotage. Given the high CVSS score and the router's role as a network gateway, the impact extends to confidentiality, integrity, and availability of organizational IT assets. Industries such as telecommunications, government, finance, and critical infrastructure that rely on Planet WGR-500 devices are particularly vulnerable. The disruption or compromise of these routers could affect operational continuity and regulatory compliance, especially under stringent European data protection laws like GDPR. Additionally, the vulnerability could be leveraged in targeted attacks or broader campaigns affecting multiple organizations across Europe.

Mitigation Recommendations

1. Immediately identify and inventory all Planet WGR-500 devices running the affected firmware version v1.3411b190912 within the network. 2. Apply firmware updates or patches as soon as they become available from Planet; monitor vendor communications closely. 3. Until patches are available, restrict access to the router's management interfaces by implementing network segmentation and firewall rules limiting HTTP access to trusted IP addresses only. 4. Disable or restrict the formPingCmd functionality if possible, or filter HTTP requests to block suspicious input targeting the 'ipaddr' parameter. 5. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous HTTP requests indicative of command injection attempts. 6. Conduct regular network traffic monitoring and log analysis focused on unusual HTTP requests to the router. 7. Educate network administrators about the vulnerability and the importance of rapid response. 8. Consider deploying compensating controls such as network-level application firewalls or reverse proxies to sanitize incoming requests. 9. Review and enhance overall network segmentation to limit the potential impact of compromised devices. 10. Prepare incident response plans specifically addressing potential exploitation of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:26:03.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e535a2a677756fc9944458

Added to database: 10/7/2025, 3:45:38 PM

Last enriched: 10/7/2025, 4:00:40 PM

Last updated: 10/7/2025, 5:14:52 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats