CVE-2025-2921

A vulnerability classified as critical has been found in Netis WF-2404 1.1.124EN. Affected is an unknown function of the file /etc/passwd. The manipulation with the input Realtek leads to use of default password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont Exploit Third Party Advisory
https://vuldb.com/?ctiid.301896 Permissions Required VDB Entry
https://vuldb.com/?id.301896 Third Party Advisory VDB Entry
https://vuldb.com/?submit.521038 Third Party Advisory VDB Entry
https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netis-systems:netis_wf-2404_firmware:1.1.124en:*:*:*:*:*:*:*
cpe:2.3:h:netis-systems:netis_wf-2404:-:*:*:*:*:*:*:*

History

17 Apr 2025, 14:21

Type Values Removed Values Added
CWE NVD-CWE-Other
References () https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont - () https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.301896 - () https://vuldb.com/?ctiid.301896 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.301896 - () https://vuldb.com/?id.301896 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.521038 - () https://vuldb.com/?submit.521038 - Third Party Advisory, VDB Entry
CPE cpe:2.3:h:netis-systems:netis_wf-2404:-:*:*:*:*:*:*:*
cpe:2.3:o:netis-systems:netis_wf-2404_firmware:1.1.124en:*:*:*:*:*:*:*
First Time Netis-systems netis Wf-2404 Firmware
Netis-systems netis Wf-2404
Netis-systems

01 Apr 2025, 20:26

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad crítica en Netis WF-2404 1.1.124EN. Se ve afectada una función desconocida del archivo /etc/passwd. La manipulación de la entrada Realtek da lugar al uso de la contraseña predeterminada. Es posible lanzar el ataque contra el dispositivo físico. Es un ataque de complejidad bastante alta. Parece difícil de explotar. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

28 Mar 2025, 20:15

Type Values Removed Values Added
References () https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont - () https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont -

28 Mar 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-28 18:15

Updated : 2025-04-17 14:21


NVD link : CVE-2025-2921

Mitre link : CVE-2025-2921

CVE.ORG link : CVE-2025-2921


JSON object : View

Products Affected

netis-systems

  • netis_wf-2404
  • netis_wf-2404_firmware
CWE
CWE-1393

Use of Default Password

NVD-CWE-Other