Skip to main content

CVE-2025-10172: Buffer Overflow in UTT 750W

High
VulnerabilityCVE-2025-10172cvecve-2025-10172
Published: Tue Sep 09 2025 (09/09/2025, 23:02:06 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: 750W

Description

A flaw has been found in UTT 750W up to 3.2.2-191225. This issue affects some unknown processing of the file /goform/formPictureUrl. Executing manipulation of the argument importpictureurl can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/09/2025, 23:35:23 UTC

Technical Analysis

CVE-2025-10172 is a high-severity buffer overflow vulnerability affecting the UTT 750W device, specifically versions up to 3.2.2-191225. The flaw exists in the processing of the /goform/formPictureUrl endpoint, where manipulation of the 'importpictureurl' argument can trigger a buffer overflow condition. This vulnerability can be exploited remotely without requiring user interaction or prior authentication, making it particularly dangerous. The buffer overflow could allow an attacker to execute arbitrary code with elevated privileges, potentially compromising the device's confidentiality, integrity, and availability. The vendor has not responded to disclosure attempts, and while no known exploits are currently observed in the wild, a proof-of-concept exploit has been published, increasing the risk of exploitation. The CVSS 4.0 base score of 8.7 reflects the ease of remote exploitation, lack of required privileges or user interaction, and the potential for significant impact on the device's security posture. The vulnerability affects a network-facing service, which increases the attack surface and likelihood of exploitation in unpatched environments.

Potential Impact

For European organizations using the UTT 750W device, this vulnerability poses a significant risk. Successful exploitation could lead to full compromise of the affected device, enabling attackers to execute arbitrary code remotely. This could result in unauthorized access to sensitive network segments, disruption of critical services, or use of the device as a pivot point for lateral movement within the network. Given that UTT 750W devices may be used in telecommunications or enterprise network infrastructure, the impact could extend to data breaches, service outages, and loss of trust. The lack of vendor response and absence of patches further exacerbate the risk, forcing organizations to rely on mitigation or device replacement. European entities with regulatory obligations under GDPR or NIS2 may face compliance risks if this vulnerability leads to data breaches or service disruptions.

Mitigation Recommendations

Since no official patch or update is currently available from the vendor, European organizations should implement the following specific mitigations: 1) Immediately isolate UTT 750W devices from untrusted networks, restricting access to management interfaces and the vulnerable endpoint (/goform/formPictureUrl) using network segmentation and firewall rules. 2) Employ Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with custom signatures to detect and block attempts to exploit the 'importpictureurl' parameter. 3) Monitor network traffic and device logs for anomalous requests targeting the vulnerable endpoint to identify potential exploitation attempts early. 4) Where possible, disable or restrict the functionality related to image import or the affected form endpoint if not required operationally. 5) Plan for device replacement or firmware upgrade once a patch becomes available, prioritizing critical infrastructure. 6) Conduct regular vulnerability scanning and penetration testing focused on this device to ensure no exploitation is ongoing. 7) Educate network security teams about this vulnerability and the importance of rapid response to suspicious activity related to UTT 750W devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-09T13:58:54.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c0b63b9ed239a66badc434

Added to database: 9/9/2025, 11:20:27 PM

Last enriched: 9/9/2025, 11:35:23 PM

Last updated: 9/10/2025, 4:07:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats