CVE Alert: CVE-2025-11045 – WAYOS – LQ_04
CVE-2025-11045
A vulnerability was identified in WAYOS LQ_04, LQ_05, LQ_06, LQ_07 and LQ_09 22.03.17. This affects an unknown function of the file /usb_paswd.asp. The manipulation of the argument Name leads to command injection. The attack can be initiated remotely. The exploit is publicly available and might be used.
AI Summary Analysis
Risk verdict
High risk with publicly available exploit; treat as priority 1.
Why this matters
Remote command injection on WayOS LQ devices enables execution of arbitrary commands without user interaction, potentially enabling full device takeover or network footholds. The impact can include disruption of device operation, data exposure, and lateral movement into adjacent assets if the device can reach internal networks.
Most likely attack path
Attackers can exploit a remote, unauthenticated web interface (AV:N, PR:N, UI:N) by sending crafted input to the Name parameter of usb_paswd.asp, triggering command execution. The CVSS indicates low confidentiality/integrity/availability impact per some vectors, but the combination of remote access and no user interaction makes it a practical initial breach. Without proper segmentation, an exposed device could be used to reach other systems; scope remains U, so exploitation stays within the device unless further access is gained.
Who is most exposed
Devices in LAN-edge deployments or SMB networks with publicly reachable admin interfaces are most at risk; any environment where the WayOS web UI is accessible from the network (or Internet) increases exposure.
Detection ideas
- Anomalous requests to /usb_paswd.asp with crafted Name values
- Unexpected command executions or new processes on affected devices
- Unusual outbound connections or beaconing from the device
- Access attempts to the admin UI from unfamiliar IPs or geographies
Mitigation and prioritisation
- Apply vendor patch or update to fixed firmware; treat as priority 1 if KEV/EPSS indicators confirm active exploitation
- If patching is delayed, restrict/admin UI exposure (VPN-only access, IP allowlists), and segment the device from critical assets
- Implement input validation/sanitisation for the Name parameter; deploy WAF/IPS rules to block injection patterns
- Strengthen logging and alerting around usb_paswd.asp activity; enable detailed forensic captures
- Schedule patching through change-management; test in staging and verify post-mitigation integrity
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.