Skip to main content

CVE-2025-8019: Buffer Overflow in Shenzhen Libituo Technology LBT-T300-T310

High
VulnerabilityCVE-2025-8019cvecve-2025-8019
Published: Tue Jul 22 2025 (07/22/2025, 15:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Shenzhen Libituo Technology
Product: LBT-T300-T310

Description

A vulnerability was found in Shenzhen Libituo Technology LBT-T300-T310 2.2.3.6. It has been rated as critical. Affected by this issue is the function sub_40B6F0 of the file at/appy.cgi. The manipulation of the argument wan_proto leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/30/2025, 01:36:38 UTC

Technical Analysis

CVE-2025-8019 is a critical buffer overflow vulnerability identified in Shenzhen Libituo Technology's LBT-T300 and LBT-T310 devices, specifically affecting version 2.2.3.6 of the firmware. The vulnerability resides in the function sub_40B6F0 within the at/appy.cgi file. It is triggered by the manipulation of the 'wan_proto' argument, which leads to a buffer overflow condition. This flaw can be exploited remotely without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability (VC:H/VI:H/VA:H), meaning an attacker could potentially execute arbitrary code, cause denial of service, or gain unauthorized access to sensitive information. The exploit has been publicly disclosed, increasing the risk of exploitation, although no known active exploits have been reported in the wild yet. The vulnerability's critical nature is underscored by its high CVSS score of 8.7, reflecting ease of exploitation and severe potential impact. The affected devices are network equipment likely used in small to medium enterprise or industrial environments, where such devices manage WAN protocol configurations. The lack of available patches at the time of disclosure further elevates the risk for users of these devices.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Shenzhen Libituo Technology's LBT-T300 or LBT-T310 devices in their network infrastructure. Successful exploitation could lead to remote code execution, allowing attackers to compromise network integrity, intercept or manipulate data, disrupt services, or pivot to other internal systems. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR due to compromised confidentiality and availability. Industrial and critical infrastructure sectors using these devices for WAN connectivity could face operational disruptions, impacting supply chains or essential services. The remote and unauthenticated nature of the exploit increases the attack surface, making it attractive for threat actors targeting European enterprises, especially those with less mature network security controls or delayed patch management processes.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement compensating controls. These include isolating affected devices from untrusted networks, especially the internet, by placing them behind robust firewalls and restricting access to management interfaces. Network segmentation should be enforced to limit lateral movement if a device is compromised. Monitoring network traffic for anomalous activity related to the 'wan_proto' parameter or unusual CGI requests can help detect exploitation attempts. Organizations should also conduct thorough inventories to identify all affected devices and prioritize their replacement or firmware upgrade once patches become available. Employing intrusion detection/prevention systems (IDS/IPS) with signatures targeting this vulnerability can provide additional protection. Finally, organizations should engage with Shenzhen Libituo Technology for updates and consider alternative vendors if timely remediation is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-22T07:20:31.264Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687fb240a83201eaac1d91a9

Added to database: 7/22/2025, 3:46:08 PM

Last enriched: 7/30/2025, 1:36:38 AM

Last updated: 9/5/2025, 1:12:43 PM

Views: 582

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats