A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/ConfigExceptMSN. Such manipulation of the argument remark leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://github.com/cymiao1978/cve/blob/main/new/17.md | Exploit Third Party Advisory |
| https://github.com/cymiao1978/cve/blob/main/new/17.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.338421 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338421 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.708351 | Third Party Advisory VDB Entry |
| https://github.com/cymiao1978/cve/blob/main/new/17.md#poc | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-26 01:15
Updated : 2025-12-31 18:57
NVD link : CVE-2025-15092
Mitre link : CVE-2025-15092
CVE.ORG link : CVE-2025-15092
JSON object : View
Products Affected
utt
- 512w
- 512w_firmware
