PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-46272 Planet Technology CVE debrief

CVE-2025-46272 is a critical unauthenticated command injection issue in affected Planet Technology network devices. CISA’s advisory says a remote attacker could execute OS commands on the host system, and vendor patches are available for the affected models.

Vendor
Planet Technology
Product
UNI-NMS-Lite
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2025-04-24
Original CVE updated
2025-05-06
Advisory published
2025-04-24
Advisory updated
2025-05-06

Who should care

Organizations using Planet Technology network devices in IT or OT environments, especially administrators responsible for WGS-804HPT-V2 and WGS-4215-8T2S deployments, should treat this as urgent. Security teams should also review any exposed management interfaces and asset inventories tied to these devices.

Technical summary

According to the CISA CSAF advisory, the flaw allows an unauthenticated attacker to trigger command injection and execute OS commands on the host system. The advisory rates it CVSS v3.1 9.1/Critical (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). The affected products listed in the CSAF product tree are Planet Technology WGS-804HPT-V2 <=2.305b250121 and WGS-4215-8T2S <=1.305b241115.

Defensive priority

Urgent. This is a network-reachable, unauthenticated command-injection vulnerability with high confidentiality and integrity impact, and patches are available.

Recommended defensive actions

  • Apply the vendor patches for the affected product versions as soon as possible.
  • Confirm whether any deployed devices match the affected models and version ranges in the CISA advisory.
  • Restrict access to device management interfaces to trusted admin networks only.
  • Segment affected devices from broader business and OT networks where feasible.
  • Monitor logs and administrative activity for unexpected command execution or configuration changes.
  • If immediate patching is not possible, follow CISA ICS defensive best practices and vendor guidance for compensating controls.

Evidence notes

This debrief is based on the CISA CSAF advisory published 2025-04-24 and revised 2025-05-06 (revision notes: typo fixes). The advisory lists affected products as WGS-804HPT-V2 <=2.305b250121 and WGS-4215-8T2S <=1.305b241115, while the narrative description mentions WGS-80HPT-V2; that discrepancy is preserved here as a source-corpus quality note. No KEV entry or ransomware association is listed in the supplied data.

Official resources

Public advisory published by CISA on 2025-04-24; revised on 2025-05-06 for typo fixes. Use the CVE published date as the issue date in timelines.