Westermo WeOS 5 Vulnerability: Remote Reboot Risk with a Side of ESP Packet Giggles!
View CSAF: Beware of the reboot! Westermo’s WeOS 5 is having a mid-life crisis with its improper validation of input. The device could be vulnerable to denial-of-service attacks, potentially causing spontaneous reboots. Upgrade to WeOS 5.24.0 for a more stable network experience—because nobody wants their router throwing tantrums.

Hot Take:
Looks like Westermo’s WeOS 5 has a new party trick: a spontaneous reboot! Forget about hitting the snooze button on your alarm clock – this vulnerability will wake you up with a full system restart, whether you like it or not. At least, for now, your dreams of an uninterrupted nap might have to wait until version 5.24.0.
Key Points:
- Westermo Network Technologies’ WeOS 5 is vulnerable to a denial-of-service (DoS) attack.
- The vulnerability can be exploited using a specifically crafted ESP packet, causing the device to reboot.
- This affects WeOS 5 versions 5.23.0 and prior, with a CVSS v4 score of 8.2.
- Mitigation includes upgrading to WeOS 5 version 5.24.0 and implementing network security best practices.
- Westermo reported this vulnerability to CISA, with no known public exploitation at this time.
Already a member? Log in here