Multiple stack-based buffer overflow vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to stack-based buffer overflow. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This buffer overflow is related to the `ipaddr` request parameter for composing the `"ping -c <counts> <ipaddr> 2>&1 > %s &"` string.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2025-2226 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Oct 2025, 16:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2226 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:planet:wgr-500:-:*:*:*:*:*:*:* cpe:2.3:o:planet:wgr-500_firmware:1.3411b190912:*:*:*:*:*:*:* |
|
First Time |
Planet
Planet wgr-500 Planet wgr-500 Firmware |
07 Oct 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-07 14:15
Updated : 2025-10-09 16:36
NVD link : CVE-2025-54399
Mitre link : CVE-2025-54399
CVE.ORG link : CVE-2025-54399
JSON object : View
Products Affected
planet
- wgr-500
- wgr-500_firmware
CWE
CWE-121
Stack-based Buffer Overflow