CVE-2025-11651
Published: 13 October 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2025-11651 is a buffer overflow vulnerability affecting UTT 进取 518G devices running firmware up to version V3v3.2.7-210919-161313. The issue resides in the sub_4247AC function within the /goform/formRemoteControl endpoint, where manipulation of the Profile argument triggers the overflow. Classified under CWE-119 and CWE-120, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
The vulnerability can be exploited remotely by an attacker with low privileges (PR:L), requiring network access but no user interaction or complex preconditions. Successful exploitation allows arbitrary code execution, leading to high impacts on confidentiality, integrity, and availability, such as data theft, system modification, or denial of service on the affected device.
Advisories from VulDB and related disclosures note no vendor response despite early contact, with no patches or mitigations provided. A proof-of-concept exploit is publicly available on GitHub, increasing the risk of widespread abuse.
The exploit disclosure heightens the urgency for users of affected UTT 进取 518G devices to isolate them or apply network controls until firmware updates are released, as no real-world exploitation in the wild is detailed in available sources.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Buffer overflow in web management endpoint (/goform/formRemoteControl) enables remote code execution on public-facing network device, directly mapping to exploitation of public-facing application.