CVE-2025-70998

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain root access to UTT HiPER 810 / nv810v4 routers via telnet using insecure default credentials. Attackers can execute arbitrary commands with full system privileges. Organizations using these routers with default configurations are affected.

💻 Affected Systems

Products:
  • UTT HiPER 810
  • UTT nv810v4
Versions: Firmware v1.5.0-140603
Operating Systems: Embedded router OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with telnet service enabled (often default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of router allowing traffic interception, network pivoting, firmware modification, and persistent backdoor installation.

🟠

Likely Case

Unauthorized root access leading to network reconnaissance, credential harvesting, and potential lateral movement to connected systems.

🟢

If Mitigated

Limited impact if telnet is disabled and strong authentication is enforced, though default credentials remain a risk.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing and telnet is often exposed by default.
🏢 Internal Only: MEDIUM - Internal routers could be compromised if attackers gain network access through other means.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires only telnet access and knowledge of default credentials. GitHub repository contains working exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check vendor website for firmware updates and security advisories.

🔧 Temporary Workarounds

Disable Telnet Service

all

Completely disable telnet service and use SSH with key-based authentication instead.

telnet disable
service telnet stop
systemctl disable telnet

Change Default Credentials

all

Immediately change all default passwords and implement strong password policies.

passwd root
configure user authentication

🧯 If You Can't Patch

  • Network segmentation: Isolate affected routers in separate VLANs with strict firewall rules.
  • Access control: Restrict telnet access to specific management IP addresses only.

🔍 How to Verify

Check if Vulnerable:

Attempt telnet connection to router port 23 and test default credentials. Check firmware version via web interface or CLI.

Check Version:

show version or check web interface System Information page

Verify Fix Applied:

Verify telnet service is disabled (port 23 closed) and new credentials are required for all administrative access.

📡 Detection & Monitoring

Log Indicators:

  • Failed telnet authentication attempts
  • Successful telnet logins from unusual IPs
  • Multiple root login attempts

Network Indicators:

  • Telnet traffic to router management interfaces
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (event="telnet_login" OR port=23) AND (user="root" OR user="admin")

🔗 References

📤 Share & Export