Skip to main content

CVE-2025-8019: Buffer Overflow in Shenzhen Libituo Technology LBT-T300-T310

High
VulnerabilityCVE-2025-8019cvecve-2025-8019
Published: Tue Jul 22 2025 (07/22/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Libituo Technology
Product: LBT-T300-T310

Description

A vulnerability was found in Shenzhen Libituo Technology LBT-T300-T310 2.2.3.6. It has been rated as critical. Affected by this issue is the function sub_40B6F0 of the file at/appy.cgi. The manipulation of the argument wan_proto leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/22/2025, 16:01:24 UTC

Technical Analysis

CVE-2025-8019 is a critical buffer overflow vulnerability identified in Shenzhen Libituo Technology's LBT-T300-T310 device, specifically in version 2.2.3.6 of its firmware. The vulnerability resides in the function sub_40B6F0 within the at/appy.cgi file, where improper handling of the 'wan_proto' argument allows an attacker to trigger a buffer overflow condition. This flaw can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The buffer overflow can lead to arbitrary code execution or denial of service, severely impacting the confidentiality, integrity, and availability of the affected device. The vulnerability has a CVSS 4.0 base score of 8.7, categorized as high severity, reflecting its significant impact and ease of exploitation. Although no public exploits have been observed in the wild yet, the exploit code has been disclosed, increasing the risk of imminent attacks. The vulnerability affects network devices that are likely used in routing or WAN protocol management, which are critical for network connectivity and security. Given the nature of the flaw, attackers could leverage this vulnerability to gain control over the device, disrupt network operations, or pivot into internal networks.

Potential Impact

For European organizations, the exploitation of CVE-2025-8019 could have severe consequences. The affected devices, likely deployed in enterprise or ISP networks, serve as critical infrastructure for WAN connectivity. Successful exploitation could lead to complete device compromise, enabling attackers to intercept, manipulate, or disrupt network traffic. This could result in data breaches, loss of service availability, and potential lateral movement within corporate networks. Organizations relying on Shenzhen Libituo Technology's LBT-T300-T310 devices may face operational disruptions, regulatory non-compliance issues (especially under GDPR due to potential data exposure), and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, making it a significant threat to network security in sectors such as telecommunications, finance, government, and critical infrastructure across Europe.

Mitigation Recommendations

1. Immediate firmware upgrade: Organizations should verify if Shenzhen Libituo Technology has released a patched firmware version beyond 2.2.3.6 and apply it promptly. 2. Network segmentation: Isolate affected devices from critical network segments to limit potential lateral movement if compromised. 3. Access control: Restrict remote management interfaces and WAN protocol configuration access to trusted IP addresses only, using firewall rules and VPNs. 4. Intrusion detection: Deploy network intrusion detection systems (NIDS) with signatures or anomaly detection tuned to identify exploitation attempts targeting the 'wan_proto' parameter or the at/appy.cgi endpoint. 5. Monitoring and logging: Enable detailed logging on affected devices and monitor for unusual activity or crashes indicative of exploitation attempts. 6. Vendor engagement: Engage with Shenzhen Libituo Technology for official patches, advisories, and support. 7. Incident response readiness: Prepare incident response plans specifically addressing potential exploitation scenarios of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-22T07:20:31.264Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687fb240a83201eaac1d91a9

Added to database: 7/22/2025, 3:46:08 PM

Last enriched: 7/22/2025, 4:01:24 PM

Last updated: 7/22/2025, 8:12:36 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats