Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10757: Buffer Overflow in UTT 1200GW

0
High
VulnerabilityCVE-2025-10757cvecve-2025-10757
Published: Sat Sep 20 2025 (09/20/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: 1200GW

Description

A weakness has been identified in UTT 1200GW up to 3.0.0-170831. The affected element is an unknown function of the file /goform/formConfigDnsFilterGlobal. This manipulation of the argument GroupName causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/28/2025, 00:48:59 UTC

Technical Analysis

CVE-2025-10757 is a high-severity buffer overflow vulnerability affecting the UTT 1200GW device, specifically versions up to 3.0.0-170831. The vulnerability resides in an unknown function within the /goform/formConfigDnsFilterGlobal file, where manipulation of the 'GroupName' argument leads to a buffer overflow condition. This flaw can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, allowing attackers to potentially execute arbitrary code, cause denial of service, or compromise sensitive data on the device. The vendor has been notified but has not issued any response or patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability does not require user interaction, and the attack complexity is low, making it accessible to a wide range of threat actors. The affected product, UTT 1200GW, is a network gateway device, likely used in enterprise or service provider environments to manage DNS filtering and other network functions. The lack of vendor response and patch availability heightens the urgency for organizations to implement mitigations to protect their infrastructure.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on UTT 1200GW devices in their network infrastructure. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to disrupt network services, intercept or manipulate DNS traffic, and potentially pivot to other internal systems. This could result in data breaches, service outages, and reputational damage. Critical sectors such as telecommunications, finance, healthcare, and government agencies that depend on reliable and secure network gateways are particularly vulnerable. The public availability of an exploit increases the likelihood of targeted attacks or opportunistic scanning campaigns within Europe. Additionally, the absence of vendor patches means organizations must rely on alternative protective measures, increasing operational complexity and risk exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately isolate or segment UTT 1200GW devices from untrusted networks to limit exposure to remote attacks. 2) Employ strict network access controls and firewall rules to restrict inbound traffic to management interfaces, especially blocking access to the /goform/formConfigDnsFilterGlobal endpoint if possible. 3) Monitor network traffic for unusual or malformed requests targeting the vulnerable function, using intrusion detection/prevention systems (IDS/IPS) with custom signatures tailored to this exploit. 4) Conduct thorough asset inventories to identify all UTT 1200GW devices and assess their firmware versions. 5) Consider deploying virtual patching via network security appliances that can detect and block exploit attempts. 6) Engage with UTT or third-party security vendors for potential unofficial patches or workarounds. 7) Prepare incident response plans specifically addressing potential exploitation scenarios involving this vulnerability. 8) Limit administrative privileges on affected devices to reduce the impact of a successful exploit. 9) Regularly back up device configurations and critical data to enable rapid recovery if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T06:51:14.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cf42444a0b186b9321b027

Added to database: 9/21/2025, 12:09:40 AM

Last enriched: 9/28/2025, 12:48:59 AM

Last updated: 11/6/2025, 5:33:14 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats