CVE-2025-63221
📋 TL;DR
This vulnerability allows unauthenticated remote attackers to bypass authentication on Axel Technology puma devices and perform administrative actions. Attackers can create new admin users, delete existing users, modify system settings, and fully compromise affected devices. Organizations using Axel Technology puma devices with firmware versions 0.8.5 to 1.0.3 are affected.
💻 Affected Systems
- Axel Technology puma devices
📦 What is this software?
Puma Firmware by Axeltechnology
⚠️ Risk & Real-World Impact
Worst Case
Complete device takeover allowing attackers to create persistent backdoors, disable security controls, exfiltrate data, and use the device as a pivot point into internal networks.
Likely Case
Attackers create administrative accounts, modify device configurations, and potentially deploy malware or use the device for further attacks.
If Mitigated
Limited impact if devices are behind firewalls with strict network segmentation and access controls.
🎯 Exploit Status
Simple HTTP requests to the vulnerable endpoint can trigger the exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://www.axeltechnology.com/
Restart Required: No
Instructions:
1. Check vendor website for security advisories
2. Monitor for firmware updates
3. Apply patches when available
🔧 Temporary Workarounds
Network Access Control
linuxBlock external access to the vulnerable endpoint using firewall rules
iptables -A INPUT -p tcp --dport 80 -m string --string "/cgi-bin/gstFcgi.fcgi" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/cgi-bin/gstFcgi.fcgi" --algo bm -j DROP
🧯 If You Can't Patch
- Isolate affected devices in a separate network segment with strict access controls
- Implement network monitoring for suspicious requests to the /cgi-bin/gstFcgi.fcgi endpoint
🔍 How to Verify
Check if Vulnerable:
Send HTTP GET request to http://<device_ip>/cgi-bin/gstFcgi.fcgi and check if it returns data without authentication
Check Version:
Check device web interface or use vendor-specific CLI commands to display firmware version
Verify Fix Applied:
Verify that requests to /cgi-bin/gstFcgi.fcgi require authentication or return 403/401 errors
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated requests to /cgi-bin/gstFcgi.fcgi
- New user account creation in system logs
- Unusual administrative actions from unexpected IP addresses
Network Indicators:
- HTTP requests to /cgi-bin/gstFcgi.fcgi without authentication headers
- POST requests to user management endpoints from external IPs
SIEM Query:
source="device_logs" AND (uri="/cgi-bin/gstFcgi.fcgi" AND NOT auth_success="true")