CVE-2025-6098

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in UTT 进取 750W devices allows remote attackers to execute arbitrary code via buffer overflow in the API's password parameter. Attackers can exploit this without authentication to potentially take full control of affected devices. All users of UTT 进取 750W up to version 5.0 are affected.

💻 Affected Systems

Products:
  • UTT 进取 750W
Versions: Up to version 5.0
Operating Systems: Embedded system firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the vulnerable API endpoint is typically accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete device compromise, data theft, network pivoting, and persistent backdoor installation.

🟠

Likely Case

Remote device takeover enabling configuration changes, credential harvesting, and use as attack platform.

🟢

If Mitigated

Limited impact if devices are isolated behind firewalls with strict network controls and no internet exposure.

🌐 Internet-Facing: HIGH - Remote exploitation without authentication makes internet-facing devices immediate targets.
🏢 Internal Only: HIGH - Even internally, this provides easy lateral movement opportunity for attackers who gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Contact vendor for updates. If patch becomes available, download from vendor portal and apply firmware update following vendor instructions.

🔧 Temporary Workarounds

Network segmentation and access control

all

Restrict network access to affected devices using firewall rules

Disable vulnerable API endpoint

all

If possible, disable or block access to /goform/setSysAdm endpoint

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules
  • Implement network monitoring for exploitation attempts and block suspicious traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is 5.0 or earlier, device is vulnerable.

Check Version:

Check via web interface at device IP or use vendor-specific CLI commands if available

Verify Fix Applied:

Verify firmware version is above 5.0 after applying any vendor update.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts to /goform/setSysAdm
  • Unusual POST requests with long password parameters
  • System crash or restart logs

Network Indicators:

  • HTTP POST requests to /goform/setSysAdm with unusually long payloads
  • Traffic from unexpected sources to device management interface

SIEM Query:

source_ip:* dest_ip:DEVICE_IP http_method:POST uri_path:"/goform/setSysAdm" payload_size:>1000

🔗 References

📤 Share & Export