CVE-2025-63218

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to completely compromise Axel Technology WOLF1MS and WOLF2MS devices by accessing the /cgi-bin/gstFcgi.fcgi endpoint without authentication. Attackers can create administrative users, delete existing users, modify system settings, and take full control of affected devices. Organizations using these devices with firmware versions 0.8.5 through 1.0.3 are at risk.

💻 Affected Systems

Products:
  • Axel Technology WOLF1MS
  • Axel Technology WOLF2MS
Versions: 0.8.5 to 1.0.3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to create persistent backdoors, exfiltrate data, pivot to internal networks, and use devices for botnet participation or further attacks.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, user account manipulation, and potential data exposure from connected systems.

🟢

If Mitigated

Limited impact if devices are behind strict network segmentation with no internet exposure and proper authentication controls on other interfaces.

🌐 Internet-Facing: HIGH - Direct internet exposure allows remote unauthenticated exploitation from anywhere.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be compromised by internal threats or compromised hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to the vulnerable endpoint with no authentication required. Public GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.axeltechnology.com/

Restart Required: No

Instructions:

Check vendor website for firmware updates. If available, download latest firmware and follow vendor's update procedures.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to affected devices using firewall rules or network segmentation.

Web Application Firewall

all

Deploy WAF rules to block requests to /cgi-bin/gstFcgi.fcgi endpoint.

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network monitoring and intrusion detection for suspicious access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[device_ip]/cgi-bin/gstFcgi.fcgi and check if it responds without authentication.

Check Version:

Check device web interface or console for firmware version information.

Verify Fix Applied:

Attempt the same request after remediation - should require authentication or return error.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to /cgi-bin/gstFcgi.fcgi
  • Unexpected user creation/modification events
  • Configuration changes from unknown sources

Network Indicators:

  • HTTP requests to /cgi-bin/gstFcgi.fcgi from unauthorized IPs
  • Unusual outbound connections from affected devices

SIEM Query:

source="device_logs" AND (uri="/cgi-bin/gstFcgi.fcgi" OR event="user_created" OR event="user_modified")

🔗 References

📤 Share & Export