Planet Technology Network Products
Planet Technology network management and switching products contain multiple critical vulnerabilities including hardcoded credentials (CWE-798), OS command injection (CWE-78), and missing access controls (CWE-306). These flaws affect managed Ethernet switches (WGS-804HPT-V2, WGS-4215-8T2S) and network management platforms (UNI-NMS-Lite, NMS-500, NMS-1000V). Successful exploitation allows an attacker to read or modify device data, gain administrative privileges, alter database entries, and execute arbitrary commands. Some products are end-of-life with no fix planned; others may have patches available but version information is not specified in the remediation text provided.
- Network access to the device's management interface (web port or SSH)
- No valid credentials required
- Device must be reachable from the attacker's network segment
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cabe9791-5fa5-445c-994a-ef9a633fb02bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.