Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9972: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet Technology ICG-2510WG-LTE (EU/US)

0
Critical
VulnerabilityCVE-2025-9972cvecve-2025-9972cwe-78
Published: Wed Sep 17 2025 (09/17/2025, 07:01:52 UTC)
Source: CVE Database V5
Vendor/Project: Planet Technology
Product: ICG-2510WG-LTE (EU/US)

Description

Certain models of Industrial Cellular Gateway developed by Planet Technology have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the device.

AI-Powered Analysis

AILast updated: 09/25/2025, 00:28:18 UTC

Technical Analysis

CVE-2025-9972 is a critical OS Command Injection vulnerability identified in the Planet Technology Industrial Cellular Gateway model ICG-2510WG-LTE, specifically versions marked as 0 (likely initial or early firmware versions). This vulnerability stems from improper neutralization of special elements used in OS commands (CWE-78), allowing unauthenticated remote attackers to inject arbitrary operating system commands. Because the vulnerability requires no authentication (AV:N/AC:L/AT:N/PR:N/UI:N), an attacker can exploit it remotely without any credentials or user interaction. The CVSS 4.0 base score of 9.3 reflects the high impact on confidentiality, integrity, and availability, with high exploitability and scope confined to the vulnerable device. Exploitation could lead to full system compromise, enabling attackers to execute arbitrary commands, potentially leading to device takeover, data exfiltration, network pivoting, or disruption of industrial communications. The device is an industrial cellular gateway used to connect industrial equipment to cellular networks, often deployed in critical infrastructure and industrial control systems. The lack of available patches at the time of publication increases the urgency for mitigation. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make this a severe threat.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially those relying on Planet Technology's ICG-2510WG-LTE gateways for industrial IoT, manufacturing automation, or critical infrastructure connectivity. Successful exploitation could lead to unauthorized control over industrial gateways, resulting in disruption of industrial processes, data breaches, or lateral movement within operational technology (OT) networks. This could impact sectors such as manufacturing, energy, transportation, and utilities, where cellular gateways are used to bridge remote equipment to central control systems. The compromise of these gateways could degrade operational availability, cause safety hazards, or lead to financial and reputational damage. Given the critical nature of industrial infrastructure in Europe and increasing reliance on cellular IoT connectivity, the threat is particularly concerning. The absence of authentication and user interaction requirements means attackers can launch automated attacks at scale, increasing the risk of widespread impact.

Mitigation Recommendations

Immediate mitigation steps include isolating affected devices from untrusted networks and restricting remote access to management interfaces. Network segmentation should be enforced to limit exposure of the gateway devices. Organizations should monitor network traffic for unusual command execution patterns or unexpected outbound connections from these devices. Since no patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block command injection attempts targeting known vulnerable parameters or endpoints. Engage with Planet Technology for firmware updates or security advisories and plan for rapid deployment once patches are released. Additionally, implement strict access control policies and multi-factor authentication on management interfaces where possible to reduce attack surface. Conduct thorough asset inventories to identify all deployed ICG-2510WG-LTE devices and prioritize their protection. Finally, maintain up-to-date backups and incident response plans tailored to OT environments to minimize downtime in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2025-09-04T07:06:17.436Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ca8d1320342ce327dbd2eb

Added to database: 9/17/2025, 10:27:31 AM

Last enriched: 9/25/2025, 12:28:18 AM

Last updated: 12/16/2025, 8:39:13 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats