CVE-2025-54406

8.8 HIGH

📋 TL;DR

This CVE describes OS command injection vulnerabilities in Planet WGR-500 routers that allow remote attackers to execute arbitrary commands via specially crafted HTTP requests. Attackers can exploit the formPingCmd functionality by manipulating the 'counts' parameter to gain system-level access. Organizations using Planet WGR-500 v1.3411b190912 are affected.

💻 Affected Systems

Products:
  • Planet WGR-500
Versions: v1.3411b190912
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the affected firmware version are vulnerable. The web management interface must be accessible for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install persistent backdoors, pivot to internal networks, exfiltrate sensitive data, and use the device as a botnet node.

🟠

Likely Case

Router takeover leading to network traffic interception, DNS manipulation, credential theft, and lateral movement to connected systems.

🟢

If Mitigated

Limited impact if device is behind firewall with strict inbound rules and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via HTTP requests, making internet-facing devices immediate targets for automated scanning and exploitation.
🏢 Internal Only: HIGH - Even internally, attackers who gain network access can exploit this to pivot through the network and compromise other systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The Talos Intelligence report includes technical details that make weaponization straightforward. Command injection via HTTP parameters is a well-understood attack vector with many existing tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check Planet website for firmware updates. 2. If update available, download from official source. 3. Backup current configuration. 4. Upload and apply new firmware through web interface. 5. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Prevent HTTP-based exploitation by disabling the web interface if not required for operations.

Access router CLI via SSH/Telnet
Navigate to web interface settings
Disable HTTP/HTTPS management

Network Access Control

linux

Restrict access to router management interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

🧯 If You Can't Patch

  • Isolate affected routers in dedicated VLAN with strict firewall rules preventing outbound connections
  • Implement network monitoring for unusual HTTP requests to router management interface

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface: System > Firmware or via CLI command 'show version'. If version matches v1.3411b190912, device is vulnerable.

Check Version:

ssh admin@router_ip 'show version' or check web interface at /cgi-bin/getSysInfo.cgi

Verify Fix Applied:

After applying any mitigation, test with controlled exploitation attempt using modified 'counts' parameter in ping request to verify command injection is blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with unusual 'counts' parameter values
  • Ping commands with shell metacharacters in parameters
  • Unexpected process execution from web server context

Network Indicators:

  • HTTP POST requests to formPingCmd with shell characters in parameters
  • Unusual outbound connections from router to external IPs

SIEM Query:

source="router_logs" AND (url="*formPingCmd*" AND (param="*counts=*;*" OR param="*counts=*|*" OR param="*counts=*`*"))

🔗 References

📤 Share & Export