CVE-2025-54405
Published: 07 October 2025
Summary
CVE-2025-54405 is a high-severity OS Command Injection (CWE-78) vulnerability in Planet Wgr-500 Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of the ipaddr parameter in HTTP requests to formPingCmd to prevent OS command injection.
Ensures timely identification, reporting, and correction of the specific command injection flaws in Planet WGR-500 firmware version v1.3411b190912.
Enforces restrictions on ipaddr inputs, such as valid IP address formats only, to block specially crafted requests leading to command injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an OS command injection in a public-facing web endpoint (formPingCmd) on a router, directly enabling exploitation of public-facing applications (T1190) and arbitrary Unix shell command execution (T1059.004) on the underlying OS.
NVD Description
Multiple OS command injection vulnerabilities exist in the formPingCmd functionality of Planet WGR-500 v1.3411b190912. A specially crafted series of HTTP requests can lead to arbitrary command execution. An attacker can send a series of HTTP requests to trigger these vulnerabilities.This…
more
command injection is related to the `ipaddr` request parameter.
Deeper analysisAI
CVE-2025-54405 describes multiple OS command injection vulnerabilities (CWE-78) in the formPingCmd functionality of Planet WGR-500 router firmware version v1.3411b190912. These flaws arise from improper handling of the `ipaddr` request parameter, allowing specially crafted series of HTTP requests to inject and execute arbitrary operating system commands.
An attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N), achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), as scored at CVSS 8.8 (CVSS:3.1). By sending a tailored sequence of HTTP requests targeting the formPingCmd endpoint, the attacker gains arbitrary command execution on the underlying system.
For mitigation details, refer to the Cisco Talos Intelligence advisories at https://talosintelligence.com/vulnerability_reports/TALOS-2025-2229 and https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2229, published alongside the CVE on 2025-10-07.
Details
- CWE(s)