Home

Description

A vulnerability was identified in UTT 进取 512W up to 3.1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigFastDirectionW. The manipulation of the argument ssid leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-11 | Updated 2025-12-12 | Assigner VulDB




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:R
10.0AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:ND/RC:UR

Problem types

Buffer Overflow

Memory Corruption

Product status

3.1.7.7-171114
affected

Timeline

2025-12-11:Advisory disclosed
2025-12-11:VulDB entry created
2025-12-11:VulDB entry last update

Credits

MaximDeVere (VulDB User) reporter

References

vuldb.com/?id.335874 (VDB-335874 | UTT 进取 512W formConfigFastDirectionW strcpy buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.335874 (VDB-335874 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.703621 (Submit #703621 | UTT / 艾泰 Aggressive 512W <= v3.1.7.7-171114 Buffer Overflow / Memory Corruption) third-party-advisory

github.com/maximdevere/CVE2/issues/7 exploit issue-tracking

cve.org (CVE-2025-14535)

nvd.nist.gov (CVE-2025-14535)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.