CVE-2025-11785
BaseFortify
Publication date: 2025-12-02
Last updated on: 2025-12-03
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| circutor | sge-plc1000_firmware | 9.0.2 |
| circutor | sge-plc1000 | * |
| circutor | sge-plc50_firmware | 9.0.2 |
| circutor | sge-plc50 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 version 9.0.2. It occurs in the 'ShowMeterPasswords()' function where user input from the 'meter' parameter is retrieved by 'GetParameter(meter)' and copied into a fixed-size buffer using 'sprintf()' without validating the input size. An attacker can exploit this by providing an excessively large input, causing the buffer to overflow and potentially leading to memory corruption or arbitrary code execution.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with limited privileges to cause a stack-based buffer overflow, potentially leading to memory corruption, denial of service, or execution of arbitrary code with high impact on confidentiality, integrity, and availability of the affected device. This could disrupt the operation of the Circutor devices managing electricity networks, leading to service interruptions or unauthorized control.
What immediate steps should I take to mitigate this vulnerability?
The affected Circutor SGE-PLC1000/SGE-PLC50 devices are discontinued since 2015 and have been replaced by newer models (Compact DC and currently GEDE EDC). It is recommended to update the firmware to version 2.0.0 or later to mitigate vulnerabilities in these devices. [1]