CVE-2025-2921

A vulnerability classified as critical has been found in Netis WF-2404 1.1.124EN. Affected is an unknown function of the file /etc/passwd. The manipulation with the input Realtek leads to use of default password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont Exploit Third Party Advisory
https://vuldb.com/?ctiid.301896 Permissions Required VDB Entry
https://vuldb.com/?id.301896 Third Party Advisory VDB Entry
https://vuldb.com/?submit.521038 Third Party Advisory VDB Entry
https://scoozi.substack.com/p/hacking-a-netis-wf-2404-router-cont Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netis-systems:netis_wf-2404_firmware:1.1.124en:*:*:*:*:*:*:*
cpe:2.3:h:netis-systems:netis_wf-2404:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-28 18:15

Updated : 2025-04-17 14:21


NVD link : CVE-2025-2921

Mitre link : CVE-2025-2921

CVE.ORG link : CVE-2025-2921


JSON object : View

Products Affected

netis-systems

  • netis_wf-2404_firmware
  • netis_wf-2404
CWE
CWE-1393

Use of Default Password

NVD-CWE-Other