CVE-2025-11779

Circutor · Circutor SGE-PLC1000, Circutor SGE-PLC50

A critical vulnerability has been identified in specific Circutor PLC devices, which are often used in industrial control systems.

Executive summary

A critical vulnerability has been identified in specific Circutor PLC devices, which are often used in industrial control systems. The flaw allows a remote attacker to execute arbitrary commands and take complete control of the affected device by sending a specially crafted web request. Successful exploitation could lead to severe operational disruptions, manipulation of physical processes, and a complete compromise of the network segment where the device resides.

Vulnerability

This vulnerability is a stack-based buffer overflow that results in a command injection condition. An attacker can exploit this by sending a malicious web request to the 'index.cgi' management interface to apply a new configuration. The 'SetLan' function, which processes these configuration changes, fails to properly sanitize input parameters. This allows an attacker to inject and execute arbitrary operating system commands with the privileges of the web application, leading to a full system compromise.

Business impact

This vulnerability is rated critical with a CVSS score of 9.8, reflecting the ease of exploitation and the severe potential impact. As the affected products are Programmable Logic Controllers (PLCs) typically deployed in Operational Technology (OT) and Industrial Control System (ICS) environments, a successful attack could have catastrophic consequences. These include disruption of critical infrastructure, manipulation of industrial processes leading to equipment damage or unsafe conditions, theft of sensitive operational data, and using the compromised device as a pivot point to attack the broader corporate or OT network.

Remediation

Immediate Action: Immediately apply the security updates provided by the vendor to patch the affected Circutor PLC products. Prioritize patching for devices that are accessible from less trusted networks. After patching, review access logs for any signs of compromise that may have occurred before the patch was applied.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the affected PLC devices. Specifically, monitor for anomalous web requests to the 'index.cgi' application, especially those containing long strings or special characters in the parameters. Monitor for any unusual outbound connections or unexpected processes running on the devices.

Compensating Controls: If immediate patching is not feasible, implement the following controls:

  • Restrict network access to the device's web management interface to a limited set of trusted administrative IP addresses.
  • Place the affected devices behind a Web Application Firewall (WAF) with rules designed to detect and block command injection and buffer overflow attempts.
  • Ensure the PLC devices are on a segmented network, isolated from the corporate IT network and the public internet, to limit the attack surface.

Exploitation status

Public Exploit Available: False

Analyst recommendation

This vulnerability represents a critical and immediate risk to the organization's operational environment. We strongly recommend that all affected Circutor PLC devices are patched immediately, following the vendor's guidance. Although this CVE is not currently listed on the CISA KEV catalog, its high severity and potential for remote code execution make it a prime candidate for future inclusion and a tempting target for attackers. Do not delay remediation; if patching is not possible, implement the recommended compensating controls without delay to mitigate the risk of a compromise.