CVE-2025-10170

8.8 HIGH

📋 TL;DR

A buffer overflow vulnerability in UTT 1200GW devices allows remote attackers to execute arbitrary code or cause denial of service by manipulating the loadBalanceNameOld parameter. This affects all UTT 1200GW devices running firmware versions up to 3.0.0-170831. The vulnerability is remotely exploitable without authentication.

💻 Affected Systems

Products:
  • UTT 1200GW
Versions: All versions up to 3.0.0-170831
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default. The vulnerable endpoint /goform/formApLbConfig is accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, network infiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to gain control of the device, intercept network traffic, or pivot to internal networks.

🟢

If Mitigated

Denial of service causing device reboot or instability if exploit attempts are blocked.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing network devices.
🏢 Internal Only: HIGH - Even internally, these devices are critical infrastructure that could be compromised.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch is available. Contact UTT vendor for firmware updates. If unavailable, implement workarounds immediately.

🔧 Temporary Workarounds

Network Access Control

linux

Block external access to UTT 1200GW web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

VLAN Segmentation

all

Isolate UTT 1200GW devices on separate VLANs with strict access controls

🧯 If You Can't Patch

  • Replace affected devices with supported alternatives from different vendors
  • Implement strict network segmentation and monitor all traffic to/from UTT devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface at http://device-ip/ or via SSH: cat /etc/version

Check Version:

cat /etc/version 2>/dev/null || grep -i version /proc/cmdline

Verify Fix Applied:

Verify firmware version is above 3.0.0-170831. No official fix exists, so verification requires vendor confirmation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /goform/formApLbConfig
  • Unusual buffer overflow errors in system logs
  • Device reboot events

Network Indicators:

  • HTTP POST requests with long loadBalanceNameOld parameters
  • Traffic to /goform/formApLbConfig from unexpected sources

SIEM Query:

source="*UTT*" AND (url="/goform/formApLbConfig" OR "loadBalanceNameOld")

🔗 References

📤 Share & Export