Description
The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system settings, leading to full compromise of the device.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63218_Axel%20Technology%20WOLF1MS%20and%20WOLF2MS%20-%20Broken%20Access%20Control
Product
https://www.axeltechnology.com/
Scores
CVSS v3
9.8
EPSS
0.0088
EPSS Percentile
75.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-284
CWE-285
Status
published
Products (2)
axeltechnology/wolf1ms_firmware
0.8.5 - 1.0.3
axeltechnology/wolf2ms_firmware
0.8.5 - 1.0.3
Published
Nov 19, 2025
Tracked Since
Feb 18, 2026