CVE-2025-10953

8.8 HIGH

📋 TL;DR

This is a remote buffer overflow vulnerability in UTT 1200GW and 1250GW routers affecting the formApMail endpoint. Attackers can exploit this by sending specially crafted senderEmail parameters to potentially execute arbitrary code or crash devices. Organizations using these specific router models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • UTT 1200GW
  • UTT 1250GW
Versions: Up to 3.0.0-170831/3.2.2-200710
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /goform/formApMail endpoint specifically. All devices with vulnerable firmware versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, lateral movement into internal networks, and persistent backdoor installation.

🟠

Likely Case

Device crash causing denial of service, potential information disclosure, or limited code execution depending on exploit sophistication.

🟢

If Mitigated

Denial of service from device crash if exploit attempts are blocked or fail, with no further network penetration.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on GitHub. The vulnerability requires no authentication and has simple exploitation vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Contact vendor for updated firmware. If unavailable, implement workarounds or replace devices.

🔧 Temporary Workarounds

Network Access Control

linux

Block external access to router management interfaces and restrict internal access to authorized IPs only.

iptables -A INPUT -p tcp --dport 80 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Web Application Firewall

all

Deploy WAF rules to block requests containing buffer overflow patterns targeting /goform/formApMail endpoint.

🧯 If You Can't Patch

  • Isolate affected routers in separate network segments with strict firewall rules
  • Monitor for exploit attempts and implement intrusion detection for buffer overflow patterns

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface or SSH. If version is 3.0.0-170831 or 3.2.2-200710 or earlier, device is vulnerable.

Check Version:

ssh admin@router-ip 'cat /etc/version' or check web interface System Status page

Verify Fix Applied:

Verify firmware version is newer than affected versions. Test endpoint with safe payloads to confirm buffer overflow protections.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /goform/formApMail with unusually long senderEmail parameters
  • Router crash/reboot logs
  • Memory violation errors in system logs

Network Indicators:

  • HTTP POST requests to /goform/formApMail with senderEmail parameter exceeding normal length
  • Traffic patterns suggesting buffer overflow exploitation

SIEM Query:

source="router_logs" AND (uri="/goform/formApMail" AND senderEmail.length>100)

🔗 References

📤 Share & Export