CVE-2025-54405: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500
Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `ipaddr` request parameter.
AI Analysis
Technical Summary
CVE-2025-54405 is an OS command injection vulnerability categorized under CWE-78, found in the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability arises from improper neutralization of special elements in the 'ipaddr' parameter within the formPingCmd HTTP request handler. This flaw allows an attacker to inject arbitrary operating system commands by sending a series of crafted HTTP requests to the device’s web interface. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N). Successful exploitation can lead to full compromise of the device, enabling attackers to execute arbitrary commands with the privileges of the web server process, potentially leading to data theft, device manipulation, or network pivoting. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability’s characteristics make it a critical risk for affected deployments. The lack of available patches at the time of publication necessitates immediate mitigation through access controls and monitoring. This vulnerability highlights the risks of insufficient input validation in embedded device management interfaces, a common attack vector in IoT and networking equipment.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized control over Planet WGR-500 routers, leading to severe consequences including interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. Confidential data passing through or stored on these devices could be exposed or altered, undermining data privacy and integrity obligations under regulations such as GDPR. Availability of network services could be compromised, impacting business continuity and operational technology environments. Given the router’s role in network connectivity, attackers could use compromised devices as footholds for further attacks, including ransomware or espionage campaigns. The high CVSS score indicates that the impact spans confidentiality, integrity, and availability, making this a critical concern for sectors relying on secure and stable network infrastructure, such as finance, healthcare, government, and telecommunications within Europe.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Planet WGR-500 devices to trusted networks only, using network segmentation and firewall rules. 2. Disable remote management features if not strictly necessary to reduce the attack surface. 3. Monitor HTTP traffic to the device for anomalous or suspicious requests targeting the formPingCmd functionality, particularly those manipulating the 'ipaddr' parameter. 4. Implement strict input validation and filtering at network perimeters to detect and block injection attempts. 5. Engage with the vendor to obtain and apply firmware updates or patches as soon as they become available. 6. If patching is delayed, consider temporary device replacement or isolation from critical network segments. 7. Conduct regular security audits and vulnerability assessments on network devices to identify similar weaknesses. 8. Educate network administrators on the risks of command injection vulnerabilities and best practices for device hardening. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-54405: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500
Description
Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `ipaddr` request parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-54405 is an OS command injection vulnerability categorized under CWE-78, found in the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability arises from improper neutralization of special elements in the 'ipaddr' parameter within the formPingCmd HTTP request handler. This flaw allows an attacker to inject arbitrary operating system commands by sending a series of crafted HTTP requests to the device’s web interface. The vulnerability requires low privileges (PR:L) but no user interaction (UI:N) and can be exploited remotely over the network (AV:N). Successful exploitation can lead to full compromise of the device, enabling attackers to execute arbitrary commands with the privileges of the web server process, potentially leading to data theft, device manipulation, or network pivoting. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the vulnerability’s characteristics make it a critical risk for affected deployments. The lack of available patches at the time of publication necessitates immediate mitigation through access controls and monitoring. This vulnerability highlights the risks of insufficient input validation in embedded device management interfaces, a common attack vector in IoT and networking equipment.
Potential Impact
For European organizations, exploitation of this vulnerability could result in unauthorized control over Planet WGR-500 routers, leading to severe consequences including interception or manipulation of network traffic, disruption of network services, and potential lateral movement within corporate or critical infrastructure networks. Confidential data passing through or stored on these devices could be exposed or altered, undermining data privacy and integrity obligations under regulations such as GDPR. Availability of network services could be compromised, impacting business continuity and operational technology environments. Given the router’s role in network connectivity, attackers could use compromised devices as footholds for further attacks, including ransomware or espionage campaigns. The high CVSS score indicates that the impact spans confidentiality, integrity, and availability, making this a critical concern for sectors relying on secure and stable network infrastructure, such as finance, healthcare, government, and telecommunications within Europe.
Mitigation Recommendations
1. Immediately restrict access to the management interface of Planet WGR-500 devices to trusted networks only, using network segmentation and firewall rules. 2. Disable remote management features if not strictly necessary to reduce the attack surface. 3. Monitor HTTP traffic to the device for anomalous or suspicious requests targeting the formPingCmd functionality, particularly those manipulating the 'ipaddr' parameter. 4. Implement strict input validation and filtering at network perimeters to detect and block injection attempts. 5. Engage with the vendor to obtain and apply firmware updates or patches as soon as they become available. 6. If patching is delayed, consider temporary device replacement or isolation from critical network segments. 7. Conduct regular security audits and vulnerability assessments on network devices to identify similar weaknesses. 8. Educate network administrators on the risks of command injection vulnerabilities and best practices for device hardening. 9. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting this vulnerability. 10. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- talos
- Date Reserved
- 2025-07-21T21:26:03.366Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e535a2a677756fc9944458
Added to database: 10/7/2025, 3:45:38 PM
Last enriched: 11/3/2025, 6:14:15 PM
Last updated: 11/20/2025, 11:05:41 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
CriticalCVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumCVE-2025-11676: CWE-20 Improper Input Validation in TP-Link System Inc. TL-WR940N V6
HighCVE-2024-4438: Uncontrolled Resource Consumption
HighCVE-2024-4437: Uncontrolled Resource Consumption
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.