Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63218: n/a

0
Critical
VulnerabilityCVE-2025-63218cvecve-2025-63218
Published: Wed Nov 19 2025 (11/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.

AI-Powered Analysis

AILast updated: 11/19/2025, 15:17:30 UTC

Technical Analysis

CVE-2025-63218 is a critical broken access control vulnerability found in Axel Technology's WOLF1MS and WOLF2MS devices, specifically in firmware versions 0.8.5 through 1.0.3. The flaw arises from the absence of authentication on the /cgi-bin/gstFcgi.fcgi endpoint, which is accessible remotely. This lack of access control allows unauthenticated attackers to interact with the device's management interface, enabling them to enumerate existing user accounts, add new administrative users, delete legitimate users, and alter system configurations. Such capabilities effectively grant attackers full control over the device, potentially allowing them to manipulate device behavior, intercept or disrupt communications, and pivot within the network. The vulnerability affects embedded device firmware, which often controls critical functions in industrial or operational technology environments. No official patches or firmware updates are currently linked, and no public exploits have been reported, but the simplicity of exploitation and the severity of impact make this a high-priority issue. The vulnerability was reserved on October 27, 2025, and published on November 19, 2025, indicating recent discovery and disclosure. The absence of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, especially those in sectors such as manufacturing, energy, and critical infrastructure where Axel Technology devices may be deployed, this vulnerability poses a significant risk. Full device compromise can lead to unauthorized control over operational technology, potentially causing service disruptions, safety hazards, data breaches, and loss of operational integrity. Attackers could use compromised devices as footholds for lateral movement within corporate or industrial networks, increasing the risk of broader network compromise. The ability to create administrative users and modify system settings without authentication undermines trust in device security and may lead to regulatory compliance issues under frameworks like NIS2 and GDPR if personal or operational data is affected. Given the critical nature of these devices in controlling physical processes, exploitation could have real-world safety and economic consequences.

Mitigation Recommendations

Organizations should immediately restrict network access to the /cgi-bin/gstFcgi.fcgi endpoint by implementing firewall rules or access control lists to limit exposure to trusted management networks only. Network segmentation should be enforced to isolate these devices from general IT networks and the internet. Monitoring and logging access attempts to the device management interface should be enhanced to detect unauthorized activity. Axel Technology should be contacted for firmware updates or patches; if none are available, consider temporary mitigations such as disabling the vulnerable service or replacing affected devices. Additionally, organizations should conduct thorough audits of user accounts on these devices to detect unauthorized changes and enforce strong password policies. Incident response plans should be updated to include detection and remediation steps for this vulnerability. Finally, organizations should evaluate their supply chain and asset inventories to identify all affected devices and prioritize remediation accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ddc1352987e43f71fbd40

Added to database: 11/19/2025, 3:02:43 PM

Last enriched: 11/19/2025, 3:17:30 PM

Last updated: 11/19/2025, 5:21:51 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats