CVE-2025-7921

Multiple · Multiple modem models from Askey

A critical remote code execution vulnerability, identified as CVE-2025-7921, affects multiple Askey modem models.

Executive summary

A critical remote code execution vulnerability, identified as CVE-2025-7921, affects multiple Askey modem models. This flaw allows an unauthenticated attacker on the internet to remotely take full control of a vulnerable modem without any user interaction. Successful exploitation could lead to a complete network compromise, data theft, or service disruption, posing a severe risk to the organization.

Vulnerability

The vulnerability is a stack-based buffer overflow. An unauthenticated remote attacker can send a specially crafted network packet to a vulnerable modem. The device's software fails to validate the size of the input data before copying it to a memory buffer on the stack, causing the buffer to overflow. This allows the attacker to overwrite critical program control data, such as the function return address, to divert the execution flow to malicious code (shellcode) supplied by the attacker, resulting in arbitrary code execution with system-level privileges on the modem.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. A successful exploit would grant an attacker complete control over the network perimeter device. The business impact is severe and includes the potential for total loss of confidentiality, integrity, and availability. Specific risks include an attacker intercepting all incoming and outgoing internet traffic (man-in-the-middle), using the modem as a pivot point to attack the internal network, disrupting internet connectivity (denial-of-service), or incorporating the device into a botnet for use in larger attacks.

Remediation

Immediate Action: The primary remediation is to update affected Askey modem models to the latest firmware version provided by the vendor, which addresses this vulnerability. After patching, administrators should monitor for any residual signs of exploitation and review device access logs for any anomalous or unauthorized activity that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced network monitoring focused on the affected modems. Security teams should look for unusual inbound traffic patterns, malformed packets, or connection attempts to non-standard ports. Intrusion Detection and Prevention Systems (IDS/IPS) should be updated with signatures to detect and block buffer overflow exploitation attempts. Monitor device logs for unexpected reboots, crashes, or memory-related error messages.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:

  • Restrict all access to the modem's remote management interface from the internet (WAN side).
  • If possible, place a firewall or other security appliance in front of the modem to filter potentially malicious traffic.
  • Implement network segmentation to isolate the modem from critical internal assets, limiting an attacker's ability to move laterally if the device is compromised.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity of this vulnerability, we recommend that immediate action be taken. All organizations using Askey modems must prioritize the identification of affected devices and apply the vendor-supplied patches without delay. Given that this flaw allows for unauthenticated remote code execution on a perimeter device, the risk of compromise is extremely high. Do not wait for evidence of active exploitation; treat this vulnerability as an imminent threat and proceed with the remediation plan immediately.