CVE-2025-10172: Buffer Overflow in UTT 750W
A flaw has been found in UTT 750W up to 3.2.2-191225. This issue affects some unknown processing of the file /goform/formPictureUrl. Executing manipulation of the argument importpictureurl can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10172 is a high-severity buffer overflow vulnerability affecting the UTT 750W device, specifically versions up to 3.2.2-191225. The vulnerability arises from improper handling of the 'importpictureurl' argument in the processing of the /goform/formPictureUrl endpoint. An attacker can remotely send a specially crafted request manipulating this argument to trigger a buffer overflow condition. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 8.7, indicating a high impact with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although the vendor was notified early, there has been no response or patch released to date. While no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The lack of vendor response and patch availability means affected organizations remain vulnerable to remote attacks that could lead to full system compromise or disruption of services relying on the UTT 750W device.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those using UTT 750W devices in critical network infrastructure or industrial control systems. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data breaches, disruption of services, or lateral movement within networks. This could affect confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing device crashes or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices at scale, increasing the risk of widespread disruption. Organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that rely on UTT 750W devices may face operational downtime, financial losses, and reputational damage. The absence of a vendor patch further exacerbates the risk, requiring organizations to implement compensating controls to mitigate potential exploitation.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigation strategies: 1) Immediately isolate or segment UTT 750W devices from untrusted networks to limit exposure to remote attacks. 2) Employ strict network access controls and firewall rules to restrict inbound traffic to the /goform/formPictureUrl endpoint or block access entirely if not required. 3) Monitor network traffic for anomalous requests targeting the importpictureurl parameter or unusual activity on the UTT 750W devices. 4) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts of this vulnerability. 5) Conduct regular vulnerability scanning and asset inventory to identify all affected devices. 6) Consider temporary device replacement or firmware rollback if possible to a non-vulnerable version. 7) Engage with UTT or third-party security vendors for potential unofficial patches or workarounds. 8) Prepare incident response plans specifically addressing exploitation scenarios of this vulnerability to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-10172: Buffer Overflow in UTT 750W
Description
A flaw has been found in UTT 750W up to 3.2.2-191225. This issue affects some unknown processing of the file /goform/formPictureUrl. Executing manipulation of the argument importpictureurl can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10172 is a high-severity buffer overflow vulnerability affecting the UTT 750W device, specifically versions up to 3.2.2-191225. The vulnerability arises from improper handling of the 'importpictureurl' argument in the processing of the /goform/formPictureUrl endpoint. An attacker can remotely send a specially crafted request manipulating this argument to trigger a buffer overflow condition. This type of vulnerability can lead to arbitrary code execution, denial of service, or system compromise without requiring user interaction or prior authentication. The vulnerability has a CVSS 4.0 base score of 8.7, indicating a high impact with network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Although the vendor was notified early, there has been no response or patch released to date. While no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The lack of vendor response and patch availability means affected organizations remain vulnerable to remote attacks that could lead to full system compromise or disruption of services relying on the UTT 750W device.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those using UTT 750W devices in critical network infrastructure or industrial control systems. Successful exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data breaches, disruption of services, or lateral movement within networks. This could affect confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing device crashes or denial of service. Given the remote and unauthenticated nature of the exploit, attackers can target vulnerable devices at scale, increasing the risk of widespread disruption. Organizations in sectors such as telecommunications, manufacturing, and critical infrastructure that rely on UTT 750W devices may face operational downtime, financial losses, and reputational damage. The absence of a vendor patch further exacerbates the risk, requiring organizations to implement compensating controls to mitigate potential exploitation.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigation strategies: 1) Immediately isolate or segment UTT 750W devices from untrusted networks to limit exposure to remote attacks. 2) Employ strict network access controls and firewall rules to restrict inbound traffic to the /goform/formPictureUrl endpoint or block access entirely if not required. 3) Monitor network traffic for anomalous requests targeting the importpictureurl parameter or unusual activity on the UTT 750W devices. 4) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect exploitation attempts of this vulnerability. 5) Conduct regular vulnerability scanning and asset inventory to identify all affected devices. 6) Consider temporary device replacement or firmware rollback if possible to a non-vulnerable version. 7) Engage with UTT or third-party security vendors for potential unofficial patches or workarounds. 8) Prepare incident response plans specifically addressing exploitation scenarios of this vulnerability to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-09T13:58:54.744Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c0b63b9ed239a66badc434
Added to database: 9/9/2025, 11:20:27 PM
Last enriched: 9/17/2025, 1:11:50 AM
Last updated: 10/29/2025, 9:39:16 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.