Stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 v0.9.2. This vulnerability allows an attacker to remotely exploit memory corruption through the 'read_packet()' function of the TACACSPLUS implementation.
Advisories

No advisories yet.

Fixes

Solution

The SGE-PLC100 and SGE-PLC50 units were discontinued in 2015. They were replaced by the Compact DC, which in turn became obsolete in November 2024. The current equivalent product is the GEDE EDC. The oldest version currently installed is 1.0.14, as it was the first to be compatible with the existing tariff system, while the latest version of these units is 1.2.21. Circutor recommends not extending the useful life of the SGE-PLC100 and SGE-PLC50 concentrators without keeping them updated. For both the Compact DC units (which replaced the SGE series) and the current GEDE EDC, it is recommended to update to the latest available version (2.0.4) or, at a minimum, to 2.0.0. This approach not only mitigates the identified vulnerabilities, but also provides new functionalities derived from the evolution of DLMS, the PRIME standard, STG protocols and the REST API.


Workaround

No workaround given by the vendor.

History

Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in Circutor SGE-PLC1000/SGE-PLC50 v0.9.2. This vulnerability allows an attacker to remotely exploit memory corruption through the 'read_packet()' function of the TACACSPLUS implementation.
Title Stack-based buffer overflow vulnreability in Circutor SGE-PLC1000/SGE-PLC50
First Time appeared Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor
Weaknesses CWE-122
CPEs cpe:2.3:a:sge-plc1000_sge-plc50:circutor:9.0.2:*:*:*:*:*:*:*
Vendors & Products Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-12-02T13:47:44.947Z

Reserved: 2025-10-15T12:06:07.138Z

Link: CVE-2025-11778

cve-icon Vulnrichment

Updated: 2025-12-02T13:47:41.255Z

cve-icon NVD

Status : Received

Published: 2025-12-02T13:15:47.400

Modified: 2025-12-02T13:15:47.400

Link: CVE-2025-11778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.