CVE-2026-3697

6.3 MEDIUM

📋 TL;DR

A stack-based buffer overflow vulnerability exists in Planet ICG-2510's web server language configuration handler. Remote attackers can exploit this by manipulating the Language argument to potentially execute arbitrary code or crash the device. This affects Planet ICG-2510 devices running firmware version 1.0_20250811.

💻 Affected Systems

Products:
  • Planet ICG-2510
Versions: 1.0_20250811
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the default web server component handling language configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, or device becoming part of a botnet.

🟠

Likely Case

Device crash causing denial of service, potentially requiring physical reset.

🟢

If Mitigated

Limited impact if device is behind firewall with restricted HTTP access.

🌐 Internet-Facing: HIGH - Attack can be launched remotely without authentication.
🏢 Internal Only: HIGH - Even internally, the vulnerability is remotely exploitable.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub repository. Remote exploitation without authentication makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider workarounds or replacement.

🔧 Temporary Workarounds

Restrict HTTP Access

linux

Block external access to the device's web interface using firewall rules.

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Disable Web Interface

linux

Turn off the HTTP server if web management is not required.

killall httpd
rm /usr/sbin/httpd

🧯 If You Can't Patch

  • Isolate device on separate VLAN with strict network segmentation
  • Implement network-based intrusion detection to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SSH: cat /etc/version | grep 1.0_20250811

Check Version:

cat /etc/version

Verify Fix Applied:

No official fix to verify. Verify workarounds by testing HTTP access is blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with abnormal Language parameter values
  • httpd process crashes in system logs

Network Indicators:

  • Unusual HTTP POST requests to language configuration endpoints
  • Traffic patterns suggesting buffer overflow attempts

SIEM Query:

source="httpd" AND (Language="*overflow*" OR Language="*AAAA*")

🔗 References

📤 Share & Export