CVE-2025-54399
BaseFortify
Publication date: 2025-10-07
Last updated on: 2025-11-03
Assigner: Talos
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| planet | wgr-500_firmware | 1.3411b190912 |
| planet | wgr-500 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves multiple stack-based buffer overflow issues in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. An attacker can send a specially crafted series of HTTP requests, specifically manipulating the 'ipaddr' request parameter, to cause a stack-based buffer overflow when composing the ping command string.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to severe impacts including high confidentiality, integrity, and availability risks. An attacker could potentially execute arbitrary code, cause denial of service, or gain unauthorized access due to the stack-based buffer overflow.