PatchSiren cyber security CVE debrief
CVE-2025-46272 Planet Technology CVE debrief
CVE-2025-46272 is a critical unauthenticated command injection issue in affected Planet Technology network devices. CISA’s advisory says a remote attacker could execute OS commands on the host system, and vendor patches are available for the affected models.
- Vendor
- Planet Technology
- Product
- UNI-NMS-Lite
- CVSS
- CRITICAL 9.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-24
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-24
- Advisory updated
- 2025-05-06
Who should care
Organizations using Planet Technology network devices in IT or OT environments, especially administrators responsible for WGS-804HPT-V2 and WGS-4215-8T2S deployments, should treat this as urgent. Security teams should also review any exposed management interfaces and asset inventories tied to these devices.
Technical summary
According to the CISA CSAF advisory, the flaw allows an unauthenticated attacker to trigger command injection and execute OS commands on the host system. The advisory rates it CVSS v3.1 9.1/Critical (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). The affected products listed in the CSAF product tree are Planet Technology WGS-804HPT-V2 <=2.305b250121 and WGS-4215-8T2S <=1.305b241115.
Defensive priority
Urgent. This is a network-reachable, unauthenticated command-injection vulnerability with high confidentiality and integrity impact, and patches are available.
Recommended defensive actions
- Apply the vendor patches for the affected product versions as soon as possible.
- Confirm whether any deployed devices match the affected models and version ranges in the CISA advisory.
- Restrict access to device management interfaces to trusted admin networks only.
- Segment affected devices from broader business and OT networks where feasible.
- Monitor logs and administrative activity for unexpected command execution or configuration changes.
- If immediate patching is not possible, follow CISA ICS defensive best practices and vendor guidance for compensating controls.
Evidence notes
This debrief is based on the CISA CSAF advisory published 2025-04-24 and revised 2025-05-06 (revision notes: typo fixes). The advisory lists affected products as WGS-804HPT-V2 <=2.305b250121 and WGS-4215-8T2S <=1.305b241115, while the narrative description mentions WGS-80HPT-V2; that discrepancy is preserved here as a source-corpus quality note. No KEV entry or ransomware association is listed in the supplied data.
Official resources
-
CVE-2025-46272 CVE record
CVE.org
-
CVE-2025-46272 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory published by CISA on 2025-04-24; revised on 2025-05-06 for typo fixes. Use the CVE published date as the issue date in timelines.