CVE-2025-7635: CWE-306 Missing Authentication for Critical Function in Calix GigaCenter ONT
Unauthenticated Telnet access vulnerability in Calix GigaCenter ONT allows root access.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI Analysis
Technical Summary
CVE-2025-7635 is a high-severity vulnerability affecting the Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. The vulnerability is classified under CWE-306, indicating a missing authentication for a critical function. In this case, the critical function is Telnet access to the device, which is exposed without any authentication requirements. This allows an unauthenticated attacker to gain root-level access to the affected ONTs remotely. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation. The vector indicates that the attack requires adjacent network access (AV:A), no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact on confidentiality, integrity, and availability is high, as the attacker can fully control the device, potentially intercepting, modifying, or disrupting network traffic. The vulnerability does not require user interaction and can be exploited remotely by anyone with network access to the device's Telnet interface. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently observed in the wild. The vulnerability was reserved in mid-July 2025 and published in early September 2025, indicating recent discovery and disclosure. The Calix GigaCenter ONTs are commonly deployed by ISPs and service providers to deliver fiber broadband services, making this vulnerability critical in the context of home and business internet infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for ISPs, telecommunications providers, and enterprises relying on Calix GigaCenter ONTs for fiber broadband connectivity. An attacker exploiting this vulnerability could gain root access to the ONT, allowing interception and manipulation of network traffic, disruption of internet services, or pivoting into internal networks. This could lead to data breaches, service outages, and compromise of sensitive communications. Given the critical role of ONTs in last-mile connectivity, exploitation could affect large numbers of end-users and business customers. The high confidentiality, integrity, and availability impact means that both private and public sector entities could face operational disruptions and reputational damage. Additionally, critical infrastructure sectors relying on these devices for connectivity could be targeted, raising concerns about national cybersecurity and resilience. The lack of authentication on Telnet access also increases the risk of automated scanning and exploitation by malicious actors within the local network or ISP infrastructure.
Mitigation Recommendations
Immediate mitigation steps include disabling Telnet access on affected Calix GigaCenter ONTs if possible, or restricting Telnet access to trusted management networks only. Network segmentation should be enforced to isolate ONTs from untrusted or public networks. ISPs and organizations should monitor network traffic for unusual Telnet connection attempts and implement intrusion detection systems to alert on unauthorized access. Since no official patches are available yet, organizations should engage with Calix support for guidance and potential firmware updates. Deploying alternative secure management protocols such as SSH instead of Telnet is recommended once patches are available. Additionally, organizations should conduct audits of all deployed ONTs to identify affected models and prioritize remediation. For long-term mitigation, ISPs should consider replacing vulnerable ONTs with updated hardware that enforces strong authentication mechanisms. Security awareness for network administrators about this vulnerability and its risks is also critical to prevent exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-7635: CWE-306 Missing Authentication for Critical Function in Calix GigaCenter ONT
Description
Unauthenticated Telnet access vulnerability in Calix GigaCenter ONT allows root access.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE.
AI-Powered Analysis
Technical Analysis
CVE-2025-7635 is a high-severity vulnerability affecting the Calix GigaCenter Optical Network Terminals (ONTs), specifically models 844E, 844G, 844GE, and 854GE. The vulnerability is classified under CWE-306, indicating a missing authentication for a critical function. In this case, the critical function is Telnet access to the device, which is exposed without any authentication requirements. This allows an unauthenticated attacker to gain root-level access to the affected ONTs remotely. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact and ease of exploitation. The vector indicates that the attack requires adjacent network access (AV:A), no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact on confidentiality, integrity, and availability is high, as the attacker can fully control the device, potentially intercepting, modifying, or disrupting network traffic. The vulnerability does not require user interaction and can be exploited remotely by anyone with network access to the device's Telnet interface. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently observed in the wild. The vulnerability was reserved in mid-July 2025 and published in early September 2025, indicating recent discovery and disclosure. The Calix GigaCenter ONTs are commonly deployed by ISPs and service providers to deliver fiber broadband services, making this vulnerability critical in the context of home and business internet infrastructure.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for ISPs, telecommunications providers, and enterprises relying on Calix GigaCenter ONTs for fiber broadband connectivity. An attacker exploiting this vulnerability could gain root access to the ONT, allowing interception and manipulation of network traffic, disruption of internet services, or pivoting into internal networks. This could lead to data breaches, service outages, and compromise of sensitive communications. Given the critical role of ONTs in last-mile connectivity, exploitation could affect large numbers of end-users and business customers. The high confidentiality, integrity, and availability impact means that both private and public sector entities could face operational disruptions and reputational damage. Additionally, critical infrastructure sectors relying on these devices for connectivity could be targeted, raising concerns about national cybersecurity and resilience. The lack of authentication on Telnet access also increases the risk of automated scanning and exploitation by malicious actors within the local network or ISP infrastructure.
Mitigation Recommendations
Immediate mitigation steps include disabling Telnet access on affected Calix GigaCenter ONTs if possible, or restricting Telnet access to trusted management networks only. Network segmentation should be enforced to isolate ONTs from untrusted or public networks. ISPs and organizations should monitor network traffic for unusual Telnet connection attempts and implement intrusion detection systems to alert on unauthorized access. Since no official patches are available yet, organizations should engage with Calix support for guidance and potential firmware updates. Deploying alternative secure management protocols such as SSH instead of Telnet is recommended once patches are available. Additionally, organizations should conduct audits of all deployed ONTs to identify affected models and prioritize remediation. For long-term mitigation, ISPs should consider replacing vulnerable ONTs with updated hardware that enforces strong authentication mechanisms. Security awareness for network administrators about this vulnerability and its risks is also critical to prevent exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2025-07-14T12:49:39.283Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c089dc075fc5f733c91a3d
Added to database: 9/9/2025, 8:11:08 PM
Last enriched: 9/9/2025, 8:11:29 PM
Last updated: 9/9/2025, 9:35:18 PM
Views: 4
Related Threats
CVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21409: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighCVE-2025-21336: CWE-203: Observable Discrepancy in Microsoft Windows 10 Version 1809
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.