CVE-2025-6097
Analyzed Analyzed - Analysis Complete
BaseFortify

Publication date: 2025-06-16

Last updated on: 2026-01-08

Assigner: VulDB

Description
A vulnerability was found in UTT 进取 750W up to 5.0 and classified as critical. Affected by this issue is the function formDefineManagement of the file /goform/setSysAdm of the component Administrator Password Handler. The manipulation of the argument passwd1 leads to unverified password change. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
utt 750w_firmware to 5.0 (inc)
utt 750w *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-640 The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
CWE-620 When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the UTT 进取 750W device firmware up to version 5.0. It exists in the Administrator Password Handler component, specifically in the function formDefineManagement within the file /goform/setSysAdm. The issue is caused by improper handling of the passwd1 argument, which allows an attacker to change the administrator password without verifying the original password or requiring any authentication. This means an attacker can remotely change the admin password and gain unauthorized administrative access to the device. [1, 2]


How can this vulnerability impact me? :

The vulnerability allows an attacker to remotely change the administrator password without any authentication, granting them unauthorized administrative control over the affected device. This can lead to full compromise of the device, allowing the attacker to alter configurations, intercept or redirect network traffic, or use the device as a foothold for further attacks within the network. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or suspicious HTTP requests targeting the /goform/setSysAdm endpoint with the passwd1 parameter being manipulated. Network intrusion detection systems (NIDS) can be configured to alert on POST or GET requests to /goform/setSysAdm containing passwd1 parameters. A simple detection command using curl to test the vulnerability could be: curl -X POST http://<target-ip>/goform/setSysAdm -d "passwd1=testpassword" -v. Additionally, inspecting router logs for unexpected password change attempts or unusual access patterns to this endpoint may help detect exploitation attempts. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to the affected device, especially blocking remote access to the /goform/setSysAdm endpoint. Since no official patches or fixes are available, it is recommended to replace the affected UTT 进取 750W device with a secure alternative. Additionally, monitoring for exploitation attempts and changing all administrator passwords manually (if possible) after suspected attacks is advised. Network segmentation and firewall rules should be applied to limit exposure until the device can be replaced. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart