CVE-2025-15090
Published: 25 December 2025
Description
A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability affects the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart results in buffer overflow. The attack may be performed from remote. The exploit…
more
has been made public and could be used.
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely identification, reporting, and remediation of flaws such as the buffer overflow in the strcpy function triggered by the timestart argument, directly addressing this CVE through patching or code fixes.
SI-10 enforces validation of information inputs like the timestart parameter to prevent buffer overflows from remotely manipulated data in /goform/formConfigNoticeConfig.
SI-16 provides memory protections such as address space layout randomization and stack canaries that mitigate exploitation of the buffer overflow for arbitrary code execution even if the input triggers it.
Security SummaryAI
CVE-2025-15090 is a buffer overflow vulnerability in UTT 进取 512W devices running versions up to 1.7.7-171114. The issue resides in the strcpy function within the /goform/formConfigNoticeConfig file, where manipulation of the timestart argument triggers the overflow. This remote vulnerability, associated with CWE-119 and CWE-120, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
A remote attacker with low privileges can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables high confidentiality, integrity, and availability impacts, potentially allowing arbitrary code execution or system compromise. A proof-of-concept exploit has been publicly disclosed.
Advisories and additional details, including the PoC, are available on VulDB (ctiid.338419, id.338419, submit.708349) and GitHub repositories maintained by cymiao1978, which document the vulnerability and exploitation methods. No specific patches are detailed in the provided references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow in web management interface (/goform/) of network device enables remote code execution via exploitation of public-facing application.