CVE-2025-15459
Remote Buffer Overflow in UTT 进取 520W strcpy Function
Publication date: 2026-01-05
Last updated on: 2026-01-05
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unknown_vendor | utt_进取_520w | 1.7.7-180627 |
| unknown_vendor | utt_进取_520w | From 1.7.7-180627 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-119 | The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data. |
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability is a critical buffer overflow in the UTT 进取 520W router firmware version 1.7.7-180627. It occurs in the strcpy function within the /goform/formUser file, where the argument passwd1 is copied without proper bounds checking. This allows an attacker to overflow the buffer by sending specially crafted input, potentially leading to denial-of-service or other impacts. The vulnerability can be exploited remotely and easily, with a public proof-of-concept exploit available. [2, 3]
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a remote attacker to cause a denial-of-service (DoS) attack on the affected device, disrupting its availability. It compromises the confidentiality, integrity, and availability of the system, potentially leading to system crashes or other malicious outcomes. Since the exploit is easy to perform and publicly available, the risk is high, and no known patches or mitigations exist. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can be performed by monitoring access attempts to the endpoint /goform/formUser on the UTT 进取 520W device, especially looking for unusual or malformed requests manipulating the passwd1 parameter. Since the vulnerability involves a buffer overflow via the strcpy function with the passwd1 argument, network intrusion detection systems (NIDS) can be configured to alert on suspicious POST or GET requests targeting /goform/formUser with unusually large or malformed passwd1 values. Specific commands depend on the environment, but for example, using curl to test the endpoint with oversized passwd1 input can help verify vulnerability presence: curl -X POST http://<device-ip>/goform/formUser -d "passwd1=$(python3 -c 'print("A"*1000)')". Additionally, packet capture tools like tcpdump or Wireshark can be used to monitor traffic to /goform/formUser for suspicious payloads. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting remote access to the affected device, especially blocking or filtering traffic to the /goform/formUser endpoint to prevent exploitation. Since no patches or vendor responses are available, consider isolating the device from untrusted networks and monitoring for exploitation attempts. If possible, replace the affected product with a secure alternative. Network-level protections such as firewalls or intrusion prevention systems (IPS) should be configured to detect and block exploit attempts targeting this vulnerability. [3]