CVE-2025-54400
Multiple · Multiple Vendors, Multiple Products (e.g., Planet WGR-500)
A critical set of stack-based buffer overflow vulnerabilities has been identified in the ping functionality of multiple network devices.
Executive summary
A critical set of stack-based buffer overflow vulnerabilities has been identified in the ping functionality of multiple network devices. An unauthenticated attacker can exploit this flaw over the network by sending a specially crafted request, which could allow them to execute arbitrary code and gain complete control of the affected system.
Vulnerability
The vulnerability exists within the formPingCmd function, which is part of the device's web-based administration interface. This function accepts user-supplied input for a network ping command but fails to perform adequate bounds checking on the size of the input. A remote, unauthenticated attacker can send a malicious HTTP request containing an overly long string as a parameter to this function, triggering a stack-based buffer overflow. By overwriting the function's return address on the stack, the attacker can redirect the program's execution flow to malicious code (shellcode) they have supplied, resulting in arbitrary code execution with the privileges of the web server process.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation by an unauthenticated attacker could lead to a complete system compromise, allowing them to take full control of the affected network device. The potential business impact includes the theft of sensitive network configuration data, interception or redirection of network traffic, and using the compromised device as a pivot point to launch further attacks against the internal network. This poses a significant risk to network confidentiality, integrity, and availability.
Remediation
Immediate Action: Apply vendor security updates immediately across all affected devices. Priority should be given to systems with management interfaces exposed to the internet. After patching, monitor for any further exploitation attempts and review historical access logs for anomalous requests targeting the device's ping utility.
Proactive Monitoring: Implement enhanced monitoring of network traffic to and from affected devices. Security teams should look for unusually long or malformed POST requests to the web administration interface. Monitor for unexpected outbound connections from these devices, which could indicate a successful compromise and command-and-control (C2) communication.
Compensating Controls: If patching is not immediately possible, implement the following controls:
- Restrict access to the device's management interface to a dedicated, trusted administrative network or specific IP addresses.
- Deploy a Web Application Firewall (WAF) or Intrusion Prevention System (IPS) with rules to detect and block oversized requests or known exploit signatures for this vulnerability.
- If the functionality is not essential, disable the web-based ping utility on the device.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Immediate action is required to mitigate the high risk posed by CVE-2025-54400. With a CVSS score of 8.8, this vulnerability presents a clear and present danger of remote system compromise. We strongly recommend that organizations prioritize the deployment of vendor-supplied security patches to all affected devices, focusing first on any internet-facing systems. Although this CVE is not yet on the CISA KEV list, its high severity and the potential for unauthenticated remote code execution make it an attractive target for future exploitation. If patching cannot be performed immediately, the compensating controls outlined above must be implemented as a matter of urgency.