CVE-2025-11783
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| circutor | sge-plc1000_firmware | 9.0.2 |
| circutor | sge-plc1000 | * |
| circutor | sge-plc50_firmware | 9.0.2 |
| circutor | sge-plc50 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 version 9.0.2. It occurs in the 'AddEvent()' function when a user-controlled username input is copied into a fixed-size buffer of 48 bytes without proper boundary checking. This improper handling can cause memory corruption, which may allow an attacker to execute code remotely on the affected device.
How can this vulnerability impact me? :
The vulnerability can lead to memory corruption and potentially allow remote code execution on the affected Circutor devices. This means an attacker could gain unauthorized control over the device, potentially disrupting its operation or using it as a foothold to attack other parts of the network.
What immediate steps should I take to mitigate this vulnerability?
The affected Circutor SGE-PLC1000/SGE-PLC50 devices are discontinued since 2015 and have been replaced by newer models. It is recommended to update the firmware to version 2.0.0 or later to mitigate this and related vulnerabilities. [1]