Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10169: Buffer Overflow in UTT 1200GW

0
High
VulnerabilityCVE-2025-10169cvecve-2025-10169
Published: Tue Sep 09 2025 (09/09/2025, 21:02:07 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: 1200GW

Description

A weakness has been identified in UTT 1200GW up to 3.0.0-170831. Affected by this issue is some unknown functionality of the file /goform/ConfigWirelessBase. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/17/2025, 00:58:54 UTC

Technical Analysis

CVE-2025-10169 is a high-severity buffer overflow vulnerability affecting the UTT 1200GW device, specifically versions up to 3.0.0-170831. The vulnerability resides in an unknown functionality related to the /goform/ConfigWirelessBase file, where manipulation of the 'ssid' argument can trigger a buffer overflow condition. This flaw allows an attacker to remotely initiate the exploit without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to severe consequences impacting confidentiality, integrity, and availability, as the CVSS vector indicates high impact on all three security properties (VC:H/VI:H/VA:H). The vendor, UTT, was contacted early about this issue but has not responded or provided a patch, and the exploit code has been publicly disclosed, increasing the risk of exploitation. Although no known exploits are currently observed in the wild, the public availability of exploit code combined with the ease of remote exploitation and high impact makes this a critical threat to affected systems. The vulnerability affects a network device (likely a wireless gateway or router), which is a critical infrastructure component in enterprise and organizational networks, making it a valuable target for attackers aiming to gain unauthorized access, disrupt network operations, or execute arbitrary code remotely.

Potential Impact

For European organizations, the impact of this vulnerability can be significant. The UTT 1200GW device is likely used in enterprise or industrial environments for wireless network management. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to full device compromise. This could result in unauthorized access to internal networks, interception or manipulation of sensitive data, disruption of wireless connectivity, and lateral movement within corporate networks. Given the device’s role in network infrastructure, successful exploitation could degrade availability of critical services or enable persistent footholds for advanced persistent threats (APTs). The lack of vendor response and patch availability increases the window of exposure, raising the urgency for organizations to implement mitigations. European organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that rely on UTT 1200GW devices are particularly at risk. Additionally, the remote and unauthenticated nature of the exploit increases the attack surface, potentially affecting organizations with less mature network segmentation or monitoring capabilities.

Mitigation Recommendations

Since no official patch is available from the vendor, European organizations should take immediate compensating controls. First, isolate the UTT 1200GW devices from direct internet exposure by placing them behind firewalls or VPNs restricting access to trusted management networks only. Implement strict network segmentation to limit lateral movement if a device is compromised. Monitor network traffic for unusual activity targeting the /goform/ConfigWirelessBase endpoint or abnormal SSID configuration requests. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for buffer overflow attempts against this device. Disable or restrict remote management interfaces if not strictly necessary. If possible, replace affected devices with alternative hardware from vendors with active security support. Additionally, conduct regular security audits and vulnerability scans to identify any exposure to this vulnerability. Maintain up-to-date asset inventories to quickly identify and respond to affected devices. Finally, prepare incident response plans specifically addressing potential exploitation scenarios involving network infrastructure devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-09T13:58:36.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c096a79ed239a66bac6ace

Added to database: 9/9/2025, 9:05:43 PM

Last enriched: 9/17/2025, 12:58:54 AM

Last updated: 10/30/2025, 2:12:58 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats