Cybersecurity researchers have disclosed three safety flaws in Planet Expertise’s WGS-804HPT industrial switches that may very well be chained to realize pre-authentication distant code execution on inclined gadgets.
“These switches are extensively utilized in constructing and residential automation programs for quite a lot of networking functions,” Claroty’s Tomer Goldschmidt stated in a Thursday report. “An attacker who is ready to remotely management considered one of these gadgets can use them to additional exploit gadgets in an inside community and do lateral motion.”
The operational expertise safety agency, which carried out an in depth evaluation of the firmware utilized in these switches utilizing the QEMU framework, stated the vulnerabilities are rooted within the dispatcher.cgi interface used to offer an online service. The listing of flaws is under –
- CVE-2024-52558 (CVSS rating: 5.3) – An integer underflow flaw that may permit an unauthenticated attacker to ship a malformed HTTP request, leading to a crash
- CVE-2024-52320 (CVSS rating: 9.8) – An working system command injection flaw that may permit an unauthenticated attacker to ship instructions by means of a malicious HTTP request, leading to distant code execution
- CVE-2024-48871 (CVSS rating: 9.8) – A stack-based buffer overflow flaw that may permit an unauthenticated attacker to ship a malicious HTTP request, leading to distant code execution
Profitable exploitation of the failings may allow an attacker to hijack the execution movement by embedding a shellcode within the HTTP request and achieve the flexibility to execute working system instructions.
Following accountable disclosure, the Taiwanese firm has rolled out patches for the shortcomings with model 1.305b241111 launched on November 15, 2024.


