CVE-2025-11651
📋 TL;DR
This is a remote buffer overflow vulnerability in UTT 进取 518G routers that allows attackers to execute arbitrary code by manipulating the Profile parameter. The vulnerability affects all versions up to V3v3.2.7-210919-161313 and can be exploited without authentication.
💻 Affected Systems
- UTT 进取 518G
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, router takeover, lateral movement to internal networks, and persistent backdoor installation.
Likely Case
Router compromise allowing traffic interception, network disruption, credential theft, and use as attack platform against internal systems.
If Mitigated
Limited impact if isolated in separate VLAN with strict firewall rules and no internet exposure.
🎯 Exploit Status
Public proof-of-concept available on GitHub, remote exploitation without authentication, buffer overflow with known offset.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available - vendor did not respond to disclosure
Restart Required: Yes
Instructions:
No official patch available. Consider replacing affected devices or implementing strict network controls.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected routers in separate VLAN with strict firewall rules
Access Control
linuxBlock external access to router management interface
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Replace affected routers with supported models from different vendors
- Implement strict network monitoring and IDS/IPS rules to detect exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check router firmware version via web interface or SSH: version should be V3v3.2.7-210919-161313 or earlier
Check Version:
Check web interface at http://router-ip/ or via SSH if enabled
Verify Fix Applied:
No official fix available. Verify workarounds by testing network isolation and access controls.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /goform/formRemoteControl
- Large Profile parameter values in HTTP logs
- Router reboot or crash logs
Network Indicators:
- HTTP requests with oversized Profile parameters
- Traffic patterns suggesting router compromise
- Unexpected outbound connections from router
SIEM Query:
http.url:*formRemoteControl* AND http.method:POST AND http.param.Profile.size>1000