Home

Description

A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. Affected by this issue is the function strcpy of the file /goform/formP2PLimitConfig. Such manipulation of the argument except leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2025-12-06 | Published 2025-12-07 | Updated 2025-12-08 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

1.7.7-171114
affected

Timeline

2025-12-06:Advisory disclosed
2025-12-06:VulDB entry created
2025-12-06:VulDB entry last update

Credits

Yun Zhang (VulDB User) reporter

References

vuldb.com/?id.334611 (VDB-334611 | UTT 进取 512W formP2PLimitConfig strcpy buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.334611 (VDB-334611 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.699220 (Submit #699220 | UTT艾泰 进取 512W Router <=v3v1.7.7-171114 Buffer Overflow) third-party-advisory

github.com/...512W/UTT 512W Buffer Overflow Vulnerability.md related

github.com/...512W/UTT 512W Buffer Overflow Vulnerability.md exploit

cve.org (CVE-2025-14191)

nvd.nist.gov (CVE-2025-14191)

Download JSON