The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.
References
| Link | Resource |
|---|---|
| https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63218_Axel%20Technology%20WOLF1MS%20and%20WOLF2MS%20-%20Broken%20Access%20Control | Exploit Third Party Advisory |
| https://www.axeltechnology.com/ | Product |
Configurations
History
No history.
Information
Published : 2025-11-19 15:15
Updated : 2026-01-12 16:01
NVD link : CVE-2025-63218
Mitre link : CVE-2025-63218
CVE.ORG link : CVE-2025-63218
JSON object : View
Products Affected
axeltechnology
- wolf1ms_firmware
- wolf1ms
- wolf2ms_firmware
- wolf2ms
