CVE-2025-15091

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on UTT 进取 512W devices through a buffer overflow in the formPictureUrl function. Attackers can exploit this without authentication to potentially take full control of affected devices. All users running versions up to 1.7.7-171114 are affected.

💻 Affected Systems

Products:
  • UTT 进取 512W
Versions: up to version 1.7.7-171114
Operating Systems: Embedded/Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using the vulnerable firmware version are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, device takeover, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to device compromise, data theft, and potential use as a foothold for further attacks.

🟢

If Mitigated

Denial of service or limited impact if exploit attempts are blocked by network controls.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability can be exploited by attackers who gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept is publicly available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates
2. If update available, download and apply following vendor instructions
3. Reboot device after update
4. Verify version is newer than 1.7.7-171114

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from internet and restrict network access

Access Control

linux

Block access to /goform/formPictureUrl endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "/goform/formPictureUrl" --algo bm -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical networks
  • Implement strict network access controls and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or SSH. If version is 1.7.7-171114 or older, device is vulnerable.

Check Version:

Check via web interface at http://device-ip/ or via SSH if available

Verify Fix Applied:

Verify firmware version is newer than 1.7.7-171114 and test that /goform/formPictureUrl endpoint no longer accepts malformed input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/formPictureUrl
  • Large payloads in formPictureUrl parameter
  • Device crash/restart logs

Network Indicators:

  • HTTP POST requests to /goform/formPictureUrl with long importpictureurl parameters
  • Unusual outbound connections from device

SIEM Query:

source="*" AND (url="/goform/formPictureUrl" OR "importpictureurl") AND bytes>1000

🔗 References

📤 Share & Export