Cyber Posture

CVE-2025-41730

Critical

Published: 10 December 2025

Published
10 December 2025
Modified
19 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-41730 is a critical-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Wago 0852-1328 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates identification, prioritization, and remediation of flaws such as the unsafe sscanf buffer overflow in CVE-2025-41730 to prevent exploitation.

prevent

SI-16 enforces memory protections like stack canaries and non-executable stacks that directly mitigate stack-based buffer overflow exploits in CVE-2025-41730.

prevent

SI-10 requires input validation at entry points to block malformed inputs that trigger the unsafe sscanf buffer overflow in check_account() for CVE-2025-41730.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation over the network of a public-facing service, directly enabling T1190 (Exploit Public-Facing Application) for initial access and full device compromise via stack buffer overflow.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.

Deeper analysisAI

CVE-2025-41730 is a vulnerability stemming from unsafe sscanf calls within the check_account() function, which allow writing arbitrary data into fixed-size stack buffers. This issue maps to CWE-121 (Stack-based Buffer Overflow) and CWE-787 (Out-of-bounds Write), resulting in full device compromise. Published on 2025-12-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts on confidentiality, integrity, and availability.

An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables full device compromise through stack buffer manipulation.

The advisory at https://certvde.com/de/advisories/VDE-2025-095 provides details on mitigation and patches.

Details

CWE(s)

Affected Products

wago
0852-1328 firmware
≤ 02.64
wago
0852-1322 firmware
≤ 02.64

CVEs Like This One

CVE-2025-41732Same product: Wago 0852-1322
CVE-2025-70240Shared CWE-121, CWE-787
CVE-2026-26732Shared CWE-121, CWE-787
CVE-2025-68670Shared CWE-121, CWE-787
CVE-2025-37169Shared CWE-121, CWE-787
CVE-2025-34468Shared CWE-121, CWE-787
CVE-2025-66046Shared CWE-121, CWE-787
CVE-2026-22189Shared CWE-121, CWE-787
CVE-2025-11541Shared CWE-121, CWE-787
CVE-2025-0282Shared CWE-121, CWE-787

References