CVE-2025-7117

8.8 HIGH

📋 TL;DR

A critical buffer overflow vulnerability in UTT HiPER 840G routers allows remote attackers to execute arbitrary code by manipulating the addHostFilter parameter. This affects all systems running HiPER 840G firmware up to version 3.1.1-190328. Attackers can exploit this without authentication to potentially take full control of affected routers.

💻 Affected Systems

Products:
  • UTT HiPER 840G
Versions: Up to 3.1.1-190328
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations with the vulnerable firmware version are affected. The /goform/websWhiteList endpoint is typically accessible via web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete router compromise, network traffic interception, lateral movement into internal networks, and persistent backdoor installation.

🟠

Likely Case

Router compromise allowing attackers to modify network configurations, intercept traffic, or use the device as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if the router is behind strict firewall rules, but still vulnerable to internal threats.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and affects internet-facing routers directly.
🏢 Internal Only: MEDIUM - Internal routers could be exploited by compromised internal hosts or attackers who have gained network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept exploit code is publicly available on GitHub. The vulnerability requires no authentication and has a straightforward exploitation path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: Yes

Instructions:

No official patch available. Consider upgrading to any newer firmware version if released by UTT, or replace the device with a different model/vendor.

🔧 Temporary Workarounds

Block Web Management Interface

all

Restrict access to the router's web management interface to trusted IP addresses only

Configure firewall rules to block external access to port 80/443 on the router
Use ACLs to restrict management interface access to specific IP ranges

Disable Unnecessary Services

all

Disable remote management features if not required

Disable WAN-side management access in router settings
Turn off UPnP and other unnecessary services

🧯 If You Can't Patch

  • Isolate affected routers in a separate VLAN with strict network segmentation
  • Implement network monitoring and intrusion detection specifically for traffic to/from affected routers

🔍 How to Verify

Check if Vulnerable:

Check router firmware version via web interface at System > System Info or via SSH using 'show version' command

Check Version:

ssh admin@router-ip 'show version' or check web interface at System > System Info

Verify Fix Applied:

Verify firmware version is newer than 3.1.1-190328. Since no patch exists, replacement is the only verification method.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /goform/websWhiteList with long addHostFilter parameters
  • Multiple failed buffer overflow attempts in system logs
  • Unexpected process crashes or restarts

Network Indicators:

  • Unusual traffic patterns to router management interface from external IPs
  • POST requests with abnormally long parameter values

SIEM Query:

source="router_logs" AND (uri_path="/goform/websWhiteList" AND (param_length>1000 OR contains(param_value, "overflow")))

🔗 References

📤 Share & Export