CVE-2025-11778
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| circutor | sge-plc1000_firmware | 0.9.2 |
| circutor | sge-plc1000 | * |
| circutor | sge-plc50_firmware | 0.9.2 |
| circutor | sge-plc50 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-11778 is a critical stack-based buffer overflow vulnerability in Circutor SGE-PLC1000 and SGE-PLC50 devices version 0.9.2. It occurs in the 'read_packet()' function of the TACACSPLUS implementation, allowing remote attackers to exploit memory corruption without requiring authentication or user interaction. This vulnerability can lead to severe security issues due to improper input validation and unsafe coding practices. [1]
How can this vulnerability impact me? :
This vulnerability can allow remote attackers to execute arbitrary code or cause a denial of service by exploiting memory corruption in affected devices. Since it does not require authentication or user interaction, it poses a high risk of unauthorized access, firmware tampering, or disruption of remote electricity network management systems using these devices. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2025-11778, it is recommended to update the firmware of Circutor SGE-PLC1000/SGE-PLC50 devices to version 2.0.0 or later, as the affected devices (version 0.9.2) have been discontinued since 2015 and replaced by newer models. This update addresses the critical stack-based buffer overflow vulnerability in the TACACSPLUS 'read_packet()' function and other related vulnerabilities. [1]