Cyber Posture

CVE-2025-41730

Critical

Published: 10 December 2025

Published
10 December 2025
Modified
19 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 28.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates identification, prioritization, and remediation of flaws such as the unsafe sscanf buffer overflow in CVE-2025-41730 to prevent exploitation.

prevent

SI-16 enforces memory protections like stack canaries and non-executable stacks that directly mitigate stack-based buffer overflow exploits in CVE-2025-41730.

prevent

SI-10 requires input validation at entry points to block malformed inputs that trigger the unsafe sscanf buffer overflow in check_account() for CVE-2025-41730.

Security SummaryAI

CVE-2025-41730 is a vulnerability stemming from unsafe sscanf calls within the check_account() function, which allow writing arbitrary data into fixed-size stack buffers. This issue maps to CWE-121 (Stack-based Buffer Overflow) and CWE-787 (Out-of-bounds Write), resulting in full device compromise. Published on 2025-12-10, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts on confidentiality, integrity, and availability.

An unauthenticated remote attacker can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables full device compromise through stack buffer manipulation.

The advisory at https://certvde.com/de/advisories/VDE-2025-095 provides details on mitigation and patches.

Details

CWE(s)

Affected Products

wago
0852-1328 firmware
≤ 02.64
wago
0852-1322 firmware
≤ 02.64

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation over the network of a public-facing service, directly enabling T1190 (Exploit Public-Facing Application) for initial access and full device compromise via stack buffer overflow.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References