CVE-2025-63218
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| axel_technology | wolf2ms | * |
| axel_technology | wolf1ms | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Axel Technology WOLF1MS and WOLF2MS devices running firmware versions 0.8.5 to 1.0.3. It is a Broken Access Control issue caused by missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. This allows unauthenticated remote attackers to list user accounts, create new administrative users, delete users, and modify system settings, potentially leading to full compromise of the device.
How can this vulnerability impact me? :
The vulnerability can lead to a full compromise of the affected device. An attacker can remotely access the device without authentication, manipulate user accounts including creating new administrative users or deleting existing ones, and change system settings. This can result in loss of control over the device, unauthorized access to sensitive information, and disruption of device functionality.