Vulnerabilidades en el software Netis Systems WF2220

Summary of CVE-2025 Vulnerabilities in Netis Systems WF2220

On May 8, 2025, CERT Polska announced vulnerabilities in the Netis Systems WF2220 product, specifically affecting version 1.2.31706. The vulnerabilities, identified as CVE-2025-3758 and CVE-2025-3759, are significant security concerns tied to a critical lack of authentication.

Vulnerability Details

CVE-2025-3758:
This vulnerability exposes the endpoint /cgi-bin-igd/netcore_get.cgi, which allows unauthorized users to access the device’s configuration. This unauthorized access includes sensitive information, like passwords presented in clear text, which can lead to exploitation.

CVE-2025-3759:
Similarly, this vulnerability involves the endpoint /cgi-bin-igd/netcore_set.cgi, which is accessible without any authentication. The lack of security here enables malicious actors to modify the device’s configuration. For instance, this could lead to the hijacking of administrator accounts or alter the access point’s (AP) password, further compounding security risks.

Both vulnerabilities fall under the Common Weakness Enumeration (CWE) category of "Lack of Authentication for Critical Function" (CWE-306).

Reporting and Disclosure Process

The report of these vulnerabilities was submitted to CERT Polska, which facilitated the coordination for their disclosure. Despite CERT Polska’s attempts to contact Netis Systems for a response or potential patch, no communication has been received from the vendor. Following their policy, CERT Polska proceeded to publish the vulnerability details 90 days after the initial outreach attempt.

The organization acknowledged Kamil Szczurowski for responsibly reporting the vulnerabilities, underscoring the importance of collaboration within the security community for timely and effective vulnerability management.

Conclusion

The vulnerabilities in the Netis Systems WF2220 present considerable risks due to unauthorized access to critical functionalities. Users of this product are advised to remain vigilant regarding these vulnerabilities and consider reviewing their device security measures. Organizations are also encouraged to stay updated on such vulnerabilities to ensure their systems are protected against potential exploitation.

For more information about vulnerability disclosure coordination, interested parties can visit CERT Polska’s website at cert.pl.

Enlace de la fuente, haz clic para tener más información

Artículos y alertas de seguridad

Consultar más contenidos y alertas

Alertas y noticias de seguridad de la información

Contacta

Contacta con nosotros para obtener soluciones integrales en IT y seguridad de la información

Estamos encantados de responder cualquier pregunta que puedas tener, y ayudarte a determinar cuáles de nuestros servicios se adaptan mejor a tus necesidades.

Nuestros beneficios:
¿Qué sucede a continuación?
1

Programamos una llamada según tu conveniencia.

2

Realizamos una reunión de descubrimiento y consultoría.

3

Preparamos una propuesta.

Agenda una consulta gratuita