CVE-2025-6097: Unverified Password Change in UTT 进取 750W
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-6097 is a vulnerability identified in the UTT 进取 750W device, specifically affecting version 5.0 of its firmware. The flaw resides in the Administrator Password Handler component, within the function formDefineManagement of the /goform/setSysAdm endpoint. The vulnerability arises due to improper validation of the passwd1 argument, which allows an attacker to change the administrator password without any verification. This means that an unauthenticated remote attacker can manipulate the password parameter to reset the administrator password, effectively gaining administrative access to the device. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. Although the vendor was notified early, there has been no response or patch released as of the publication date (June 16, 2025). The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network vector, no authentication, no user interaction) but limited impact on confidentiality and availability. The vulnerability does not directly impact confidentiality or availability but compromises integrity by allowing unauthorized administrative control, which can lead to further malicious activities such as configuration changes, network interception, or persistent backdoors. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of exploitation attempts. The lack of vendor response and patch availability heightens the urgency for affected organizations to implement mitigations.
Potential Impact
For European organizations using the UTT 进取 750W device, this vulnerability poses a significant risk to network security and operational integrity. Unauthorized password changes can lead to full administrative compromise of the device, enabling attackers to alter configurations, intercept or redirect traffic, disable security controls, or establish persistent access. This can result in data breaches, disruption of network services, and potential lateral movement within corporate networks. Given that the device is likely used in network infrastructure roles, such as routing or switching, exploitation could impact availability and integrity of critical communication channels. The absence of vendor patches increases exposure time, and organizations relying on this device must assume a heightened threat level. Additionally, the remote and unauthenticated nature of the exploit means that attackers can target these devices from anywhere, increasing the attack surface. European organizations in sectors with high reliance on network infrastructure—such as telecommunications, finance, manufacturing, and government—may face operational disruptions and data compromise if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate network segmentation: Isolate UTT 进取 750W devices from untrusted networks and restrict management interface access to trusted administrative subnets only. 2. Implement strict firewall rules to block external access to the /goform/setSysAdm endpoint or the device’s management ports from outside the internal network. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block attempts to exploit the passwd1 parameter manipulation. 4. Monitor device logs and network traffic for unusual password change attempts or unauthorized administrative access. 5. If possible, disable remote management interfaces temporarily until a patch or vendor guidance is available. 6. Maintain an inventory of all UTT 进取 750W devices and verify firmware versions to identify affected units. 7. Engage with UTT or authorized resellers to seek firmware updates or official mitigation guidance. 8. Consider replacing vulnerable devices with alternative products from vendors with active security support if patching is not forthcoming. 9. Educate network administrators on the vulnerability and enforce strong operational security practices to detect and respond to suspicious activity quickly.
Affected Countries
Germany, France, Italy, Spain, Poland, Netherlands, Belgium, Czech Republic
CVE-2025-6097: Unverified Password Change in UTT 进取 750W
Description
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-6097 is a vulnerability identified in the UTT 进取 750W device, specifically affecting version 5.0 of its firmware. The flaw resides in the Administrator Password Handler component, within the function formDefineManagement of the /goform/setSysAdm endpoint. The vulnerability arises due to improper validation of the passwd1 argument, which allows an attacker to change the administrator password without any verification. This means that an unauthenticated remote attacker can manipulate the password parameter to reset the administrator password, effectively gaining administrative access to the device. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. Although the vendor was notified early, there has been no response or patch released as of the publication date (June 16, 2025). The CVSS v4.0 base score is 6.9, categorized as medium severity, reflecting the ease of exploitation (network vector, no authentication, no user interaction) but limited impact on confidentiality and availability. The vulnerability does not directly impact confidentiality or availability but compromises integrity by allowing unauthorized administrative control, which can lead to further malicious activities such as configuration changes, network interception, or persistent backdoors. No known exploits are currently observed in the wild, but public disclosure of the exploit code increases the likelihood of exploitation attempts. The lack of vendor response and patch availability heightens the urgency for affected organizations to implement mitigations.
Potential Impact
For European organizations using the UTT 进取 750W device, this vulnerability poses a significant risk to network security and operational integrity. Unauthorized password changes can lead to full administrative compromise of the device, enabling attackers to alter configurations, intercept or redirect traffic, disable security controls, or establish persistent access. This can result in data breaches, disruption of network services, and potential lateral movement within corporate networks. Given that the device is likely used in network infrastructure roles, such as routing or switching, exploitation could impact availability and integrity of critical communication channels. The absence of vendor patches increases exposure time, and organizations relying on this device must assume a heightened threat level. Additionally, the remote and unauthenticated nature of the exploit means that attackers can target these devices from anywhere, increasing the attack surface. European organizations in sectors with high reliance on network infrastructure—such as telecommunications, finance, manufacturing, and government—may face operational disruptions and data compromise if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate network segmentation: Isolate UTT 进取 750W devices from untrusted networks and restrict management interface access to trusted administrative subnets only. 2. Implement strict firewall rules to block external access to the /goform/setSysAdm endpoint or the device’s management ports from outside the internal network. 3. Deploy network intrusion detection/prevention systems (IDS/IPS) with custom signatures to detect and block attempts to exploit the passwd1 parameter manipulation. 4. Monitor device logs and network traffic for unusual password change attempts or unauthorized administrative access. 5. If possible, disable remote management interfaces temporarily until a patch or vendor guidance is available. 6. Maintain an inventory of all UTT 进取 750W devices and verify firmware versions to identify affected units. 7. Engage with UTT or authorized resellers to seek firmware updates or official mitigation guidance. 8. Consider replacing vulnerable devices with alternative products from vendors with active security support if patching is not forthcoming. 9. Educate network administrators on the vulnerability and enforce strong operational security practices to detect and respond to suspicious activity quickly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-15T06:56:23.268Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 684f630aa8c9212743834d99
Added to database: 6/16/2025, 12:19:22 AM
Last enriched: 6/16/2025, 12:34:35 AM
Last updated: 8/14/2025, 3:42:00 PM
Views: 28
Related Threats
CVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumCVE-2025-55726
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.