Article Details
Scrape Timestamp (UTC): 2025-01-17 14:13:15.927
Source: https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html
Original Article Text
Click to Toggle View
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation. Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. "These switches are widely used in building and home automation systems for a variety of networking applications," Claroty's Tomer Goldschmidt said in a Thursday report. "An attacker who is able to remotely control one of these devices can use them to further exploit devices in an internal network and do lateral movement." The operational technology security firm, which carried out an extensive analysis of the firmware used in these switches using the QEMU framework, said the vulnerabilities are rooted in the dispatcher.cgi interface used to provide a web service. The list of flaws is below - Successful exploitation of the flaws could permit an attacker to hijack the execution flow by embedding a shellcode in the HTTP request and gain the ability to execute operating system commands. Following responsible disclosure, the Taiwanese company has rolled out patches for the shortcomings with version 1.305b241111 released on November 15, 2024.
Daily Brief Summary
Cybersecurity experts have identified three significant vulnerabilities in Planet Technology's WGS-804HPT industrial switches.
These flaws enable pre-authentication remote code execution, allowing attackers to take full control of the devices without prior authorization.
The compromised switches can be exploited to attack further within internal networks, enabling lateral movements and broader network exploitation.
The vulnerabilities center on the dispatcher.cgi interface, critical for the device's web services.
Attackers can execute operating system commands and disrupt operations by embedding malicious code into HTTP requests.
Claroty, using the QEMU framework, conducted the comprehensive study revealing these security weaknesses.
Following these findings, Planet Technology has issued patches to address these vulnerabilities with the latest firmware update (Version 1.305b241111) as of November 15, 2024.
It is crucial for users of the WGS-804HPT switches in home and building automation networks to update their devices immediately to mitigate potential risks.