Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-46272 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical OS Command Injection flaw in PLANET industrial switches. πŸ“‰ **Consequences**: Attackers can execute arbitrary system commands, potentially leading to full device compromise or network disruption.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (Improper Neutralization of Special Elements used in an OS Command). The software fails to sanitize user inputs before passing them to the OS shell.

Q3Who is affected? (Versions/Components)

🏭 **Affected Products**: 1. **PLANET WGS-804HPT** (8-port 10/100/1000T Managed Switch) 2. **PLANET WGS-4215-8T2S** (8-port 10/100/1000T + 2-port SFP Managed Switch) *Vendor: Planet Technology*

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: - Execute **OS-level commands** with the privileges of the application. - **High Impact**: Full Confidentiality (C:H) and Integrity (I:H) loss.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Exploitation Threshold**: **LOW**. - **Network**: Remote (AV:N) - **Complexity**: Low (AC:L) - **Privileges**: None required (PR:N) - **User Interaction**: None (UI:N) *Simply put: No login or user action needed.*

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“¦ **Public Exploit**: **No**. The provided data shows an empty `pocs` array. No public Proof-of-Concept (PoC) or wild exploitation code is currently available.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: - Scan for **PLANET WGS-804HPT** and **WGS-4215-8T2S** devices. - Look for **CWE-78** indicators in web management interfaces or SNMP inputs. - Use ICS-specific scanners to detect command injection pat…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Unknown**. The data does not list specific patch versions or mitigation steps from the vendor. Refer to CISA Advisory ICSA-25-114-06 for official guidance.

Q9What if no patch? (Workaround)

🚧 **Workaround**: - **Network Segmentation**: Isolate these switches from untrusted networks. - **Access Control**: Restrict management interface access to trusted IPs only. - **Monitor**: Watch for unusual outbound con…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. - CVSS Score implies Critical impact (High Conf/Integrity). - Remote, unauthenticated exploitation makes it a prime target for automated attacks. Immediate mitigation is recommended.