Planet WGS-804HPT Switches: A Comedy of Critical Flaws or a Hacker’s Delight?
Critical flaws in the Planet WGS-804HPT industrial switch could be chained to achieve remote code execution. These vulnerabilities include buffer overflow, OS command injection, and integer underflow. Attackers can exploit them to hijack execution flow via malicious HTTP requests, making your network as secure as a screen door on a submarine.

Hot Take:
Looks like the Planet WGS-804HPT switches are auditioning for a role in the next blockbuster cyber-thriller. With critical flaws that could make any hacker’s heart skip a beat, these switches are just one exploit away from turning your smart home into a not-so-smart crime scene. Time to update that firmware, folks, or your IoT devices might just start plotting against you!
Key Points:
- Planet WGS-804HPT switches are vulnerable to remote code execution due to critical flaws.
- Three vulnerabilities have been identified: buffer overflow, OS command injection, and integer underflow.
- These vulnerabilities can be exploited to gain unauthorized control and execute system commands.
- Firmware version 1.305b241111 has been released to fix these issues.
- Researchers used QEMU to emulate components and find vulnerabilities.
Already a member? Log in here