CVE-2025-10169: Buffer Overflow in UTT 1200GW
A weakness has been identified in UTT 1200GW up to 3.0.0-170831. Affected by this issue is some unknown functionality of the file /goform/ConfigWirelessBase. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10169 is a high-severity buffer overflow vulnerability affecting the UTT 1200GW device, specifically versions up to 3.0.0-170831. The vulnerability resides in an unknown functionality related to the /goform/ConfigWirelessBase file, where manipulation of the 'ssid' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely initiate the exploit without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to severe consequences impacting confidentiality, integrity, and availability, as the CVSS vector indicates high impact on all three security properties (VC:H/VI:H/VA:H). The vendor, UTT, was contacted early about this issue but has not responded or provided a patch, and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits are currently observed in the wild, the public availability of exploit code combined with the ease of remote exploitation and high impact makes this a critical threat to affected systems. The vulnerability affects a network device (likely a wireless gateway or router), which is a critical infrastructure component in enterprise and organizational networks, making it a valuable target for attackers aiming to gain unauthorized access, disrupt network operations, or execute arbitrary code remotely.
Potential Impact
For European organizations, the impact of this vulnerability can be significant. The UTT 1200GW device is likely used in enterprise or industrial environments for wireless network management. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise. This could result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of wireless connectivity, and lateral movement within corporate networks. Given the device’s role in network infrastructure, successful exploitation could degrade availability of critical services or enable persistent footholds for advanced persistent threats (APTs). The lack of vendor response and patch availability increases the window of exposure, raising the urgency for organizations to implement mitigations. European organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that rely on UTT 1200GW devices are particularly at risk. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, potentially affecting organizations with less mature network segmentation or monitoring capabilities.
Mitigation Recommendations
Since no official patch is available from the vendor, European organizations should take immediate compensating controls. First, isolate the UTT 1200GW devices from direct internet exposure by placing them behind firewalls or VPNs restricting access to trusted management networks only. Implement strict network segmentation to limit lateral movement if a device is compromised. Monitor network traffic for unusual activity targeting the /goform/ConfigWirelessBase endpoint or abnormal SSID configuration requests. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against this device. Disable or restrict remote management interfaces if not strictly necessary. If possible, replace affected devices with alternative hardware from vendors with active security support. Additionally, conduct regular security audits and vulnerability scans to identify any exposure to this vulnerability. Maintain up-to-date asset inventories to quickly identify and respond to affected devices. Finally, prepare incident response plans specifically addressing potential exploitation scenarios involving network infrastructure devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-10169: Buffer Overflow in UTT 1200GW
Description
A weakness has been identified in UTT 1200GW up to 3.0.0-170831. Affected by this issue is some unknown functionality of the file /goform/ConfigWirelessBase. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10169 is a high-severity buffer overflow vulnerability affecting the UTT 1200GW device, specifically versions up to 3.0.0-170831. The vulnerability resides in an unknown functionality related to the /goform/ConfigWirelessBase file, where manipulation of the 'ssid' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely initiate the exploit without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to severe consequences impacting confidentiality, integrity, and availability, as the CVSS vector indicates high impact on all three security properties (VC:H/VI:H/VA:H). The vendor, UTT, was contacted early about this issue but has not responded or provided a patch, and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits are currently observed in the wild, the public availability of exploit code combined with the ease of remote exploitation and high impact makes this a critical threat to affected systems. The vulnerability affects a network device (likely a wireless gateway or router), which is a critical infrastructure component in enterprise and organizational networks, making it a valuable target for attackers aiming to gain unauthorized access, disrupt network operations, or execute arbitrary code remotely.
Potential Impact
For European organizations, the impact of this vulnerability can be significant. The UTT 1200GW device is likely used in enterprise or industrial environments for wireless network management. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise. This could result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of wireless connectivity, and lateral movement within corporate networks. Given the device’s role in network infrastructure, successful exploitation could degrade availability of critical services or enable persistent footholds for advanced persistent threats (APTs). The lack of vendor response and patch availability increases the window of exposure, raising the urgency for organizations to implement mitigations. European organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that rely on UTT 1200GW devices are particularly at risk. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, potentially affecting organizations with less mature network segmentation or monitoring capabilities.
Mitigation Recommendations
Since no official patch is available from the vendor, European organizations should take immediate compensating controls. First, isolate the UTT 1200GW devices from direct internet exposure by placing them behind firewalls or VPNs restricting access to trusted management networks only. Implement strict network segmentation to limit lateral movement if a device is compromised. Monitor network traffic for unusual activity targeting the /goform/ConfigWirelessBase endpoint or abnormal SSID configuration requests. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against this device. Disable or restrict remote management interfaces if not strictly necessary. If possible, replace affected devices with alternative hardware from vendors with active security support. Additionally, conduct regular security audits and vulnerability scans to identify any exposure to this vulnerability. Maintain up-to-date asset inventories to quickly identify and respond to affected devices. Finally, prepare incident response plans specifically addressing potential exploitation scenarios involving network infrastructure devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-09T13:58:36.869Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c096a79ed239a66bac6ace
Added to database: 9/9/2025, 9:05:43 PM
Last enriched: 9/17/2025, 12:58:54 AM
Last updated: 10/29/2025, 9:40:12 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.