Overview
The CVE-2025-50610 vulnerability is a buffer overflow issue that was uncovered in Netis WF2880 v2.1.40207. It has the potential to significantly impact users and systems that utilize this software, due to its exploitable nature. The vulnerability is of importance due to its ability to cause a system crash, leading to a possible Denial of Service (DoS) attack, and the potential for system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-50610
Severity: High (7.5/10)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System crash, potential Denial of Service (DoS) attack, possible system compromise or data leakage
Affected Products
Product | Affected Versions
Netis WF2880 | v2.1.40207
How the Exploit Works
This exploit works by an attacker manipulating the value of ‘wl_base_set_5g’ in the payload of the cgitest.cgi file. By controlling this value, a buffer overflow can be triggered in the FUN_00476598 function. Buffer overflows can lead to a crash in the program, causing a potential Denial of Service (DoS). There is also a potential for system compromise or data leakage as a result of this vulnerability.
Conceptual Example Code
The following is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP request where the attacker manipulates the ‘wl_base_set_5g’ value.
POST /cgitest.cgi HTTP/1.1
Host: target.example.com
Content-Type: application/x-www-form-urlencoded
wl_base_set_5g=AAAA... // long string of A's to overflow buffer
