CVE-2025-11780
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| circutor | sge-plc1000_firmware | 9.0.2 |
| circutor | sge-plc1000 | * |
| circutor | sge-plc50_firmware | 9.0.2 |
| circutor | sge-plc50 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 version 9.0.2. It occurs in the 'showMeterReport()' function where user input from the 'meter' parameter is retrieved by 'GetParameter(meter)' and copied into a fixed-size buffer using 'sprintf()' without validating the input size. An attacker can exploit this by providing an excessively large input, causing memory corruption and potentially allowing execution of arbitrary code.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption through a stack-based buffer overflow, which may allow an attacker to execute arbitrary code remotely without user interaction or authentication. This can compromise the affected device's integrity, availability, and confidentiality, potentially disrupting electricity network management and causing operational failures.
What immediate steps should I take to mitigate this vulnerability?
The affected Circutor SGE-PLC1000/SGE-PLC50 devices are discontinued since 2015 and have been replaced by newer models. It is recommended to update the firmware to version 2.0.0 or later to mitigate vulnerabilities in these devices. [1]