Two critical security vulnerabilities have been discovered in Planet Technology’s Industrial Cellular Gateways, prompting a high-severity warning from the Taiwan Computer Emergency Response Team / Coordination Center (TWCERT/CC). Tracked as CVE-2025-9971 and CVE-2025-9972, both vulnerabilities carry a CVSS score of 9.8, indicating their potential for serious impact. These flaws allow unauthenticated attackers to gain remote access and execute malicious actions, including complete control over affected devices. The impacted models include ICG-2510WG-LTE (EU/US) versions up to 1.0-20240918 and ICG-2510W-LTE (EU/US) versions up to 1.0_20240411. The root of the issue lies in the devices' failure to implement proper authentication mechanisms and input validation. CVE-2025-9971 enables attackers to alter device configurations without needing login credentials, making it possible to disrupt system operations remotely. More critically, CVE-2025-9972 permits attackers to inject and execute arbitrary operating system commands, giving them the ability to take full control of the gateway. Given that these devices are commonly deployed in industrial environments, smart cities, and critical infrastructure, the potential impact includes not only service disruption but also broader network compromise. To mitigate these risks, both TWCERT/CC and Planet Technology urge users to update their devices without delay. Specifically, users should upgrade the ICG-2510WG-LTE and ICG-2510W-LTE models to firmware version 1.0_20250811 or newer. Timely patching is essential to prevent exploitation, ensure system integrity, and safeguard industrial networks from further attack vectors.
Researchers at Cofense Intelligence found the campaign of group Lone None distributing advanced malware in the form of spoofed copyright takedown notices. The campaign delivers the...
A widespread security issue has been uncovered in mobile apps using Firebase, where misconfigured services expose sensitive user data to unauthenticated attackers. First disclosed ...
A new phishing campaign is targeting PyPI maintainers using deceptive emails that mimic official PyPI communications. These emails, crafted to look like account verification reques...