CVE-2025-15090

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected UTT 进取 512W devices via a buffer overflow in the formConfigNoticeConfig function. Attackers can exploit this without authentication by sending specially crafted requests. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • UTT 进取 512W
Versions: up to version 1.7.7-171114
Operating Systems: Embedded/Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running vulnerable firmware versions are affected. The vulnerable function is accessible via web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to remote code execution, device takeover, and potential lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to install malware, create backdoors, or disrupt device functionality.

🟢

If Mitigated

Denial of service or limited information disclosure if exploit fails to achieve full code execution.

🌐 Internet-Facing: HIGH - Attack can be performed remotely without authentication, and public exploit exists.
🏢 Internal Only: HIGH - Even internally, vulnerable devices can be exploited by attackers who gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept exploit is publicly available on GitHub. Attack requires network access to device web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates. 2. If update available, download latest firmware. 3. Backup configuration. 4. Upload and install new firmware via web interface. 5. Reboot device. 6. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and internet access

Access Control Lists

linux

Restrict access to device management interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Replace affected devices with supported models from vendors providing security updates
  • Implement strict network monitoring and intrusion detection for anomalous traffic to device management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device web interface (typically under System > Status or About). Compare against vulnerable version range.

Check Version:

curl -s http://device-ip/status.cgi | grep -i version

Verify Fix Applied:

Verify firmware version is newer than 1.7.7-171114. Test if formConfigNoticeConfig endpoint still accepts malformed timestart parameter.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/formConfigNoticeConfig
  • Large timestart parameter values in web logs
  • Device crash or restart logs

Network Indicators:

  • Unusual traffic patterns to device management ports (80, 443, 8080)
  • POST requests with abnormally long parameters

SIEM Query:

source="web_logs" AND uri="/goform/formConfigNoticeConfig" AND (param_length>100 OR status_code>=500)

🔗 References

📤 Share & Export