Skip to main content

CVE-2025-10757: Buffer Overflow in UTT 1200GW

High
VulnerabilityCVE-2025-10757cvecve-2025-10757
Published: Sat Sep 20 2025 (09/20/2025, 23:32:06 UTC)
Source: CVE Database V5
Vendor/Project: UTT
Product: 1200GW

Description

A weakness has been identified in UTT 1200GW up to 3.0.0-170831. The affected element is an unknown function of the file /goform/formConfigDnsFilterGlobal. This manipulation of the argument GroupName causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:09:49 UTC

Technical Analysis

CVE-2025-10757 is a high-severity buffer overflow vulnerability affecting the UTT 1200GW device, specifically versions up to 3.0.0-170831. The vulnerability resides in an unknown function within the /goform/formConfigDnsFilterGlobal file, where improper handling of the 'GroupName' argument allows an attacker to cause a buffer overflow. This flaw can be exploited remotely without requiring user interaction or prior authentication, making it particularly dangerous. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no confirmed in-the-wild attacks have been reported yet. The vendor has not responded to disclosure attempts, and no patches or mitigations have been officially released. The buffer overflow could allow attackers to execute arbitrary code, crash the device, or disrupt network services, potentially leading to full compromise of the affected device and lateral movement within the network. Given that UTT 1200GW devices are network appliances likely used in enterprise or service provider environments, exploitation could severely impact network security and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on UTT 1200GW devices in their network infrastructure. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to intercept, modify, or disrupt network traffic. This could compromise sensitive data confidentiality and integrity, disrupt critical business operations, and potentially serve as a foothold for further attacks within the corporate network. The lack of vendor response and absence of patches exacerbate the threat, leaving organizations exposed. Critical sectors such as telecommunications, finance, government, and critical infrastructure in Europe could face operational disruptions and data breaches if these devices are compromised. Additionally, the public availability of exploit code lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks against European entities using this product.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls. These include isolating UTT 1200GW devices from untrusted networks and restricting management interfaces to trusted administrative hosts via network segmentation and access control lists (ACLs). Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit the buffer overflow. Monitor network traffic for unusual patterns targeting the /goform/formConfigDnsFilterGlobal endpoint. Disable or restrict the vulnerable functionality if possible, or replace the device with alternative hardware from vendors with active security support. Regularly audit device firmware versions and configurations to identify affected units. Establish strict network monitoring and incident response procedures to quickly detect and contain potential exploitation attempts. Engage with UTT or third-party security providers for potential unofficial patches or workarounds. Finally, maintain up-to-date backups and recovery plans to mitigate the impact of potential device compromise or denial of service.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-20T06:51:14.744Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cf42444a0b186b9321b027

Added to database: 9/21/2025, 12:09:40 AM

Last enriched: 9/21/2025, 12:09:49 AM

Last updated: 9/23/2025, 12:10:57 AM

Views: 31

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats