CVE-2025-54401

8.8 HIGH

📋 TL;DR

Multiple stack-based buffer overflow vulnerabilities in Planet WGR-500 routers allow remote code execution via specially crafted HTTP requests. Attackers can exploit these vulnerabilities by manipulating the 'submit-url' parameter in the formPingCmd functionality. Organizations using Planet WGR-500 routers with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Planet WGR-500
Versions: v1.3411b190912
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web management interface's formPingCmd functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary code with router privileges, potentially establishing persistent access, intercepting network traffic, or launching attacks against internal networks.

🟠

Likely Case

Remote code execution leading to router compromise, network traffic interception, and potential lateral movement to connected devices.

🟢

If Mitigated

Denial of service or limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the vulnerable endpoint. No authentication is required based on the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor Planet vendor website for security advisories
2. Apply firmware updates when available
3. Restart router after firmware update

🔧 Temporary Workarounds

Disable web management interface

all

Disable the web management interface if not required for operations

Restrict web interface access

all

Configure firewall rules to restrict access to the web management interface

🧯 If You Can't Patch

  • Segment affected routers in isolated network zones
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or CLI. If version is v1.3411b190912, the device is vulnerable.

Check Version:

Check via web interface at System Status or via CLI if available

Verify Fix Applied:

Verify firmware version has been updated to a version later than v1.3411b190912

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to formPingCmd endpoint
  • Multiple failed ping command attempts
  • Abnormal traffic patterns to router management interface

Network Indicators:

  • HTTP POST requests with unusually long submit-url parameters
  • Traffic to router management interface from unexpected sources

SIEM Query:

source_ip="router_ip" AND (uri="*formPingCmd*" OR uri="*ping*" OR method="POST") AND (param="submit-url" OR param_length>1000)

🔗 References

📤 Share & Export