CVE-2025-2919

6.8 MEDIUM

📋 TL;DR

This critical vulnerability in Netis WF-2404 routers allows attackers with physical access to activate test or debug logic via the UART interface, potentially gaining unauthorized access or control. It affects Netis WF-2404 router users, particularly those with devices in physically accessible locations. The vulnerability stems from hardware-level debug functionality that remains accessible at runtime.

💻 Affected Systems

Products:
  • Netis WF-2404
Versions: 1.1.124EN
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this firmware version are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router functionality, enabling persistent backdoor access, network traffic interception, credential theft, and lateral movement into connected networks.

🟠

Likely Case

Local attacker gains administrative access to router, modifies configurations, installs malware, or disrupts network services for targeted users.

🟢

If Mitigated

Limited impact due to physical access controls preventing unauthorized individuals from reaching the device's UART interface.

🌐 Internet-Facing: LOW - Requires physical access to device, not remotely exploitable via network interfaces.
🏢 Internal Only: HIGH - Physical access to device in office/home environments could lead to complete compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires physical UART connection to router board; detailed public disclosure includes hardware connection instructions and exploit steps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider replacing affected hardware with supported alternatives.

🔧 Temporary Workarounds

Physical Security Hardening

all

Secure physical access to router devices to prevent unauthorized UART connection

UART Interface Disable

all

Physically disable or obscure UART pins on router board to prevent connection

🧯 If You Can't Patch

  • Decommission and replace affected Netis WF-2404 routers with supported, secure alternatives
  • Implement strict physical access controls: locked cabinets, surveillance, access logs for router locations

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or serial console; if version is 1.1.124EN, device is vulnerable

Check Version:

Check router web interface at 192.168.1.1 or use serial console connection to view firmware version

Verify Fix Applied:

No fix available to verify; replacement with different hardware is the only mitigation

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Configuration changes without authorized access
  • Unknown serial/console access attempts

Network Indicators:

  • Sudden changes in router behavior or network traffic patterns
  • Unauthorized DNS or routing changes

SIEM Query:

Device logs showing physical tampering indicators or unauthorized configuration modifications

🔗 References

📤 Share & Export