Skip to main content

CVE-2025-7077: Buffer Overflow in Shenzhen Libituo Technology LBT-T300-T310

High
VulnerabilityCVE-2025-7077cvecve-2025-7077
Published: Sun Jul 06 2025 (07/06/2025, 06:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Libituo Technology
Product: LBT-T300-T310

Description

A vulnerability classified as critical has been found in Shenzhen Libituo Technology LBT-T300-T310 up to 2.2.3.6. This affects the function config_3g_para of the file /appy.cgi. The manipulation of the argument username_3g/password_3g leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/06/2025, 06:54:30 UTC

Technical Analysis

CVE-2025-7077 is a critical buffer overflow vulnerability identified in Shenzhen Libituo Technology's LBT-T300-T310 devices, specifically affecting firmware versions up to 2.2.3.6. The vulnerability resides in the function config_3g_para within the /appy.cgi endpoint, where improper handling of the username_3g and password_3g parameters allows an attacker to overflow a buffer. This flaw can be exploited remotely without requiring user interaction or prior authentication, making it highly accessible to threat actors. The buffer overflow could enable arbitrary code execution, potentially allowing attackers to take full control of the affected device. The disclosure notes that other parameters might also be vulnerable, suggesting a broader attack surface. Despite early vendor notification, Shenzhen Libituo Technology has not responded or issued patches, increasing the risk of exploitation. The CVSS 4.0 base score is 8.7, reflecting high severity with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits are confirmed in the wild yet, but public exploit details have been disclosed, raising the likelihood of imminent attacks.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those using Shenzhen Libituo Technology LBT-T300-T310 devices in their network infrastructure. These devices are likely used in telecommunications or IoT contexts, where compromise could lead to unauthorized network access, data exfiltration, disruption of services, or pivoting to other internal systems. The ability to execute arbitrary code remotely without authentication means attackers could deploy malware, establish persistent backdoors, or disrupt critical communications. This could affect sectors reliant on stable 3G connectivity or embedded network devices, including industrial control systems, smart city infrastructure, and enterprise networks. The lack of vendor response and patches exacerbates the risk, as organizations must rely on mitigations or device replacement. Additionally, the potential for other parameters to be vulnerable increases the attack surface and complicates defense efforts.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Immediately identify and inventory all Shenzhen Libituo LBT-T300-T310 devices in use, including firmware versions. 2) Restrict network access to the /appy.cgi endpoint by implementing strict firewall rules or network segmentation to limit exposure to untrusted networks, especially the internet. 3) Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting buffer overflow attempts on the affected parameters. 4) Monitor device logs and network traffic for anomalous activity indicative of exploitation attempts. 5) Where feasible, replace vulnerable devices with alternative hardware from vendors with active security support. 6) If device replacement is not immediately possible, consider disabling or restricting 3G configuration interfaces remotely or locally to reduce attack vectors. 7) Engage with Shenzhen Libituo Technology for updates and monitor vulnerability databases for any forthcoming patches or advisories. 8) Conduct regular security assessments and penetration testing focusing on these devices to detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-05T12:24:52.381Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 686a1a1b6f40f0eb72cc1c86

Added to database: 7/6/2025, 6:39:23 AM

Last enriched: 7/6/2025, 6:54:30 AM

Last updated: 7/6/2025, 10:44:40 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats