CVE-2025-54404

8.8 HIGH

📋 TL;DR

This CVE describes OS command injection vulnerabilities in Planet WGR-500 routers that allow remote attackers to execute arbitrary commands via specially crafted network requests. Attackers can exploit the 'new_device_name' parameter to gain unauthorized command execution. Organizations using affected Planet WGR-500 routers are at risk.

💻 Affected Systems

Products:
  • Planet WGR-500
Versions: v1.3411b190912
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the swctrl functionality specifically. All devices running the vulnerable firmware version are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the router allowing persistent backdoor installation, network traffic interception, lateral movement to connected devices, and router bricking.

🟠

Likely Case

Router takeover leading to network disruption, credential harvesting, and use as pivot point for attacks on internal networks.

🟢

If Mitigated

Limited impact if network segmentation isolates the router and strict firewall rules prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited via network requests, making internet-facing routers immediately vulnerable to remote attackers.
🏢 Internal Only: HIGH - Even internally accessible routers are vulnerable to attackers who gain network access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a network-accessible function and requires only crafted HTTP requests. No authentication appears to be required based on the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available at time of analysis

Restart Required: Yes

Instructions:

1. Check Planet vendor website for firmware updates. 2. Download latest firmware. 3. Access router admin interface. 4. Navigate to firmware update section. 5. Upload and apply new firmware. 6. Reboot router.

🔧 Temporary Workarounds

Network Isolation

all

Isolate the router from untrusted networks and restrict access to management interfaces

Firewall Rules

linux

Implement strict firewall rules to block external access to router management interfaces

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Segment the router on isolated VLAN with strict access controls
  • Implement network monitoring for unusual traffic patterns to/from the router

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via admin interface. If version is v1.3411b190912, the device is vulnerable.

Check Version:

Check via web interface at http://router-ip/status or via SSH if available

Verify Fix Applied:

After firmware update, verify the version no longer matches v1.3411b190912 and test that the swctrl functionality properly validates input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to swctrl endpoints
  • Commands containing shell metacharacters in new_device_name parameter
  • Unexpected process execution in router logs

Network Indicators:

  • HTTP requests with shell commands in parameters
  • Unusual outbound connections from router
  • Traffic patterns suggesting command execution

SIEM Query:

source="router_logs" AND (uri="*swctrl*" AND param="*new_device_name*" AND value="*;*" OR value="*|*" OR value="*`*" OR value="*$(*")

🔗 References

📤 Share & Export