CVE Alert: CVE-2025-54401 – Planet – WGR-500

CVE-2025-54401

HIGHNo exploitation known

Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This buffer overflow is related to the `submit-url` request parameter.

CVSS v3.1 (8.8)
AV NETWORK · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
Planet
Product
WGR-500
Versions
v1.3411b190912
CWE
CWE-121, CWE-121: Stack-based Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-10-07T13:55:10.615Z
Updated
2025-10-07T14:40:15.989Z

AI Summary Analysis

Risk verdict

High risk of remote, unauthenticated network exploitation; current exploitation indicators are not shown as active in the wild, but the severity warrants prompt remediation.

Why this matters

Successful exploitation could lead to full control of the WGR-500 device, with potential leakage or destruction of data and disruption of network services. Attackers could leverage the impact to pivot to adjacent devices or gain persistence in the facility network.

Most likely attack path

An attacker with network access can send crafted HTTP requests to the submit-url parameter to trigger a stack-based overflow (no user interaction required, low attacker effort). The vulnerability offers total impact on confidentiality, integrity, and availability with low privileges and network-scoped impact, suggesting feasible remote code execution if mitigations are not in place. Lateral movement would depend on exposed interfaces and trust boundaries within the network.

Who is most exposed

Devices like Planet WGR-500 are typically deployed in facility networks or remote sites, sometimes exposed to the WAN or semi‑trusted segments. Environments with exposed web interfaces or remote management services are most at risk.

Detection ideas

  • Unusual or repeated HTTP requests targeting the submit-url parameter, triggering abnormal device behavior.
  • Logs showing crashes, stack traces, or memory exhaustion on formPingCmd handling.
  • Sudden spikes in CPU/memory use or device reboots linked to HTTP traffic patterns.
  • IDS/IPS alerts for anomalous submit-url related payloads.
  • Correlated authentication anomalies or failed login attempts preceding stability events.

Mitigation and prioritisation

  • Apply the vendor patch or firmware update addressing this vulnerability; verify compatibility and test in change window.
  • If patching is slow, implement network controls: restrict or block remote access to the device’s management interfaces; enforce network segmentation.
  • Validate and constrain the submit-url parameter at input validation or via a WAF/reverse proxy; limit request rate to the affected endpoint.
  • Disable unnecessary exposure (WAN access, remote management) and harden logging for rapid investigation.
  • Plan a firmware upgrade path and track the remediation in change management; schedule testing before enterprise rollout.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.