CVE-2025-11783

9.8 CRITICAL

📋 TL;DR

A stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2 allows remote attackers to execute arbitrary code by sending specially crafted username input. This affects industrial control systems using these specific PLC models, potentially compromising critical infrastructure operations.

💻 Affected Systems

Products:
  • Circutor SGE-PLC1000
  • Circutor SGE-PLC50
Versions: v9.0.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component where username input is processed. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution leading to disruption of industrial processes, data theft, or physical damage to connected equipment.

🟠

Likely Case

Service disruption, unauthorized access to PLC configuration, and potential lateral movement within industrial networks.

🟢

If Mitigated

Denial of service or temporary PLC malfunction if exploit attempts are blocked by network controls.

🌐 Internet-Facing: HIGH - PLCs often have web interfaces accessible from networks, making remote exploitation feasible.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending crafted input to the affected function, which is straightforward for attackers with basic buffer overflow knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-circutor-products-0

Restart Required: No

Instructions:

1. Monitor vendor website for security updates. 2. Apply firmware patch when available. 3. Verify patch installation by checking firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected PLCs in separate network segments with strict firewall rules.

Access Control Lists

all

Restrict network access to PLC web interfaces to authorized IP addresses only.

🧯 If You Can't Patch

  • Deploy network intrusion prevention systems (IPS) to detect and block buffer overflow attempts.
  • Implement application layer firewalls to filter malicious input patterns targeting the AddEvent function.

🔍 How to Verify

Check if Vulnerable:

Check firmware version via PLC web interface or management console. If version is 9.0.2, system is vulnerable.

Check Version:

Check via web interface at http://[PLC_IP]/status or consult device documentation for version query methods.

Verify Fix Applied:

Verify firmware version has been updated to a version later than 9.0.2 when patch becomes available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Multiple failed login events with long usernames
  • PLC service restarts

Network Indicators:

  • TCP packets with unusually long username fields sent to PLC web ports
  • Traffic patterns matching buffer overflow exploits

SIEM Query:

source="PLC_web_logs" AND (username_length>48 OR event="AddEvent" AND status="error")

🔗 References

📤 Share & Export