CVE-2025-9972: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet Technology ICG-2510WG-LTE (EU/US)
Certain models of Industrial Cellular Gateway developed by Planet Technology have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the device.
AI Analysis
Technical Summary
CVE-2025-9972 is a critical OS Command Injection vulnerability identified in the Planet Technology Industrial Cellular Gateway model ICG-2510WG-LTE, specifically versions marked as 0 (likely initial or early firmware versions). This vulnerability stems from improper neutralization of special elements used in OS commands (CWE-78), allowing unauthenticated remote attackers to inject arbitrary operating system commands. Because the vulnerability requires no authentication (AV:N/AC:L/AT:N/PR:N/UI:N), an attacker can exploit it remotely without any credentials or user interaction. The CVSS 4.0 base score of 9.3 reflects the high impact on confidentiality, integrity, and availability, with high exploitability and scope confined to the vulnerable device. Exploitation could lead to full system compromise, enabling attackers to execute arbitrary commands, potentially leading to device takeover, data exfiltration, network pivoting, or disruption of industrial communications. The device is an industrial cellular gateway used to connect industrial equipment to cellular networks, often deployed in critical infrastructure and industrial control systems. The lack of available patches at the time of publication increases the urgency for mitigation. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make this a severe threat.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on Planet Technology's ICG-2510WG-LTE gateways for industrial IoT, manufacturing automation, or critical infrastructure connectivity. Successful exploitation could lead to unauthorized control over industrial gateways, resulting in disruption of industrial processes, data breaches, or lateral movement within operational technology (OT) networks. This could impact sectors such as manufacturing, energy, transportation, and utilities, where cellular gateways are used to bridge remote equipment to central control systems. The compromise of these gateways could degrade operational availability, cause safety hazards, or lead to financial and reputational damage. Given the critical nature of industrial infrastructure in Europe and increasing reliance on cellular IoT connectivity, the threat is particularly concerning. The absence of authentication and user interaction requirements means attackers can launch automated attacks at scale, increasing the risk of widespread impact.
Mitigation Recommendations
Immediate mitigation steps include isolating affected devices from untrusted networks and restricting remote access to management interfaces. Network segmentation should be enforced to limit exposure of the gateway devices. Organizations should monitor network traffic for unusual command execution patterns or unexpected outbound connections from these devices. Since no patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block command injection attempts targeting known vulnerable parameters or endpoints. Engage with Planet Technology for firmware updates or security advisories and plan for rapid deployment once patches are released. Additionally, implement strict access control policies and multi-factor authentication on management interfaces where possible to reduce attack surface. Conduct thorough asset inventories to identify all deployed ICG-2510WG-LTE devices and prioritize their protection. Finally, maintain up-to-date backups and incident response plans tailored to OT environments to minimize downtime in case of compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2025-9972: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Planet Technology ICG-2510WG-LTE (EU/US)
Description
Certain models of Industrial Cellular Gateway developed by Planet Technology have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-9972 is a critical OS Command Injection vulnerability identified in the Planet Technology Industrial Cellular Gateway model ICG-2510WG-LTE, specifically versions marked as 0 (likely initial or early firmware versions). This vulnerability stems from improper neutralization of special elements used in OS commands (CWE-78), allowing unauthenticated remote attackers to inject arbitrary operating system commands. Because the vulnerability requires no authentication (AV:N/AC:L/AT:N/PR:N/UI:N), an attacker can exploit it remotely without any credentials or user interaction. The CVSS 4.0 base score of 9.3 reflects the high impact on confidentiality, integrity, and availability, with high exploitability and scope confined to the vulnerable device. Exploitation could lead to full system compromise, enabling attackers to execute arbitrary commands, potentially leading to device takeover, data exfiltration, network pivoting, or disruption of industrial communications. The device is an industrial cellular gateway used to connect industrial equipment to cellular networks, often deployed in critical infrastructure and industrial control systems. The lack of available patches at the time of publication increases the urgency for mitigation. No known exploits are reported in the wild yet, but the ease of exploitation and critical impact make this a severe threat.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially those relying on Planet Technology's ICG-2510WG-LTE gateways for industrial IoT, manufacturing automation, or critical infrastructure connectivity. Successful exploitation could lead to unauthorized control over industrial gateways, resulting in disruption of industrial processes, data breaches, or lateral movement within operational technology (OT) networks. This could impact sectors such as manufacturing, energy, transportation, and utilities, where cellular gateways are used to bridge remote equipment to central control systems. The compromise of these gateways could degrade operational availability, cause safety hazards, or lead to financial and reputational damage. Given the critical nature of industrial infrastructure in Europe and increasing reliance on cellular IoT connectivity, the threat is particularly concerning. The absence of authentication and user interaction requirements means attackers can launch automated attacks at scale, increasing the risk of widespread impact.
Mitigation Recommendations
Immediate mitigation steps include isolating affected devices from untrusted networks and restricting remote access to management interfaces. Network segmentation should be enforced to limit exposure of the gateway devices. Organizations should monitor network traffic for unusual command execution patterns or unexpected outbound connections from these devices. Since no patches are currently available, consider deploying virtual patching via intrusion prevention systems (IPS) that can detect and block command injection attempts targeting known vulnerable parameters or endpoints. Engage with Planet Technology for firmware updates or security advisories and plan for rapid deployment once patches are released. Additionally, implement strict access control policies and multi-factor authentication on management interfaces where possible to reduce attack surface. Conduct thorough asset inventories to identify all deployed ICG-2510WG-LTE devices and prioritize their protection. Finally, maintain up-to-date backups and incident response plans tailored to OT environments to minimize downtime in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-09-04T07:06:17.436Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ca8d1320342ce327dbd2eb
Added to database: 9/17/2025, 10:27:31 AM
Last enriched: 9/25/2025, 12:28:18 AM
Last updated: 12/16/2025, 8:39:13 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-27561: n/a
HighCVE-2025-65834: n/a
HighCVE-2025-13532: CWE-916 Use of Password Hash With Insufficient Computational Effort in Fortra Core Privileged Access Manager (BoKS)
MediumCVE-2025-8872: CWE-400 Uncontrolled Resource Consumption in Arista Networks EOS
HighCVE-2025-68142: CWE-1333: Inefficient Regular Expression Complexity in facelessuser pymdown-extensions
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.