CVE-2025-10169

A weakness has been identified in UTT 1200GW up to 3.0.0-170831. Affected by this issue is some unknown functionality of the file /goform/ConfigWirelessBase. This manipulation of the argument ssid causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-1/UTT%201200GW-1.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.323204 Permissions Required VDB Entry
https://vuldb.com/?id.323204 Third Party Advisory VDB Entry
https://vuldb.com/?submit.636696 Third Party Advisory VDB Entry
https://github.com/lin-3-start/lin-cve/blob/main/UTT%201200GW-1/UTT%201200GW-1.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:utt:1200gw_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:utt:1200gw:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-09-09 21:15

Updated : 2026-01-08 16:16


NVD link : CVE-2025-10169

Mitre link : CVE-2025-10169

CVE.ORG link : CVE-2025-10169


JSON object : View

Products Affected

utt

  • 1200gw
  • 1200gw_firmware
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')