Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54406: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet WGR-500

0
High
VulnerabilityCVE-2025-54406cvecve-2025-54406cwe-78
Published: Tue Oct 07 2025 (10/07/2025, 13:55:04 UTC)
Source: CVE Database V5
Vendor/Project: Planet
Product: WGR-500

Description

Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This command injection is related to the `counts` request parameter.

AI-Powered Analysis

AILast updated: 11/03/2025, 18:14:33 UTC

Technical Analysis

CVE-2025-54406 is an OS command injection vulnerability identified in the Planet WGR-500 router firmware version v1.3411b190912. The vulnerability arises from improper neutralization of special elements in the 'counts' parameter within the formPingCmd functionality. An attacker can send specially crafted HTTP requests to the router, which fails to sanitize input properly, allowing arbitrary operating system commands to be executed with the privileges of the affected process. The vulnerability requires no user interaction and only low privileges (network access) to exploit, making it accessible to remote attackers within the network or potentially from the internet if the device is exposed. The impact includes full compromise of the device, enabling attackers to manipulate network traffic, exfiltrate sensitive data, disrupt services, or use the device as a foothold for further attacks. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, combined with ease of exploitation. No patches or public exploits are currently available, but the vulnerability is publicly disclosed and should be considered critical for any organization using the affected firmware. The vulnerability is categorized under CWE-78, indicating improper neutralization of special elements used in OS commands, a common and dangerous injection flaw.

Potential Impact

For European organizations, the impact of CVE-2025-54406 is significant. Compromise of Planet WGR-500 routers can lead to unauthorized access to internal networks, interception or manipulation of sensitive communications, and disruption of network availability. Enterprises relying on these routers for critical connectivity may experience operational outages or data breaches. The ability to execute arbitrary commands can allow attackers to install persistent malware, pivot to other internal systems, or exfiltrate confidential information. Given the router's role as a network gateway, exploitation could undermine perimeter defenses and compromise broader IT infrastructure. Industries such as telecommunications, manufacturing, government agencies, and critical infrastructure operators using these devices are particularly vulnerable. The lack of known exploits in the wild currently offers a window for proactive mitigation, but the high severity and ease of exploitation mean that the threat could escalate rapidly if weaponized.

Mitigation Recommendations

1. Immediately identify and inventory all Planet WGR-500 devices running firmware version v1.3411b190912 within the network. 2. Apply firmware updates as soon as the vendor releases a patch addressing CVE-2025-54406; monitor vendor advisories closely. 3. If patches are not yet available, restrict network access to the management interface and formPingCmd endpoint by implementing firewall rules or access control lists (ACLs) to limit HTTP requests to trusted sources only. 4. Disable remote management features on affected devices to reduce exposure. 5. Monitor network traffic for unusual HTTP requests targeting the 'counts' parameter or other suspicious activity indicative of exploitation attempts. 6. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect command injection attempts against Planet routers. 7. Conduct regular security audits and penetration tests focusing on network devices to identify and remediate similar vulnerabilities. 8. Educate network administrators about the risks and signs of exploitation related to this vulnerability. 9. Consider network segmentation to isolate vulnerable devices from critical systems until remediation is complete.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
talos
Date Reserved
2025-07-21T21:26:03.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e535a2a677756fc994445b

Added to database: 10/7/2025, 3:45:38 PM

Last enriched: 11/3/2025, 6:14:33 PM

Last updated: 11/21/2025, 5:40:07 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats